Skip to main content

Bi-objective Analysis of an Adaptive Secure Data Storage in a Multi-cloud

  • Conference paper
  • First Online:
High Performance Computing (CARLA 2018)

Abstract

Security issues related to cloud computing as well as all solutions proposed in the literature are one of the high topics for research. However, there are many unsolved problems regarded to cloud storage. In this paper, we focused on an adaptive model of data storage based on Secret Sharing Schemes (SSS) and Residue Number System (RNS). We proposed five strategies to minimize information loss and time to data upload and download into the cloud. We evaluate these strategies on seven Cloud Storage Providers (CSPs). We study a correlation of system settings with the probability of information loss, data redundancy, speed of access to CSPs, and encoding/decoding speeds We demonstrate that strategies that consider CSPs with the best upload access speeds and then, after storing, migrate to the CSPs with the least probability of information loss or best download speeds show better performance behavior.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, pp. 647–651. IEEE (2012). https://doi.org/10.1109/ICCSEE.2012.193

  2. Krutz, R.L., Vines, R.D.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing, 1st edn. Wiley, Hoboken (2010)

    Google Scholar 

  3. Gagnaire, M., et al.: Downtime statistics of current cloud solutions. International Working Group on Cloud Computing Resiliency, Technical report (2012)

    Google Scholar 

  4. IWGCR International Working Group on Cloud Computing Resiliency Homepage. http://iwgcr.org/. Accessed 1 Sept 2018

  5. SecureList Homepage. https://securelist.com/all/?tag=53. Accessed 3 Nov 2018

  6. CloudHarmony Homepage. https://cloudharmony.com/status-of-storage. Accessed 3 Nov 2018

  7. Dimakis, A.G., Godfrey, P.B., Wu, Y., Wainwright, M.J., Ramchandran, K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theory 56(9), 4539–4551 (2010). https://doi.org/10.1109/TIT.2010.2054295

    Article  Google Scholar 

  8. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006). https://doi.org/10.1145/1127345.1127346

    Article  MATH  Google Scholar 

  9. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009). https://doi.org/10.1016/j.future.2008.12.001

    Article  Google Scholar 

  10. Ghemawat, S., Gobioff, H., Leung, S.-T.: The Google file system. In: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 29–43. ACM, New York (2003). https://doi.org/10.1145/1165389.945450

  11. Ganesan, A., Alagappan, R., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H.: Redundancy does not imply fault tolerance: analysis of distributed storage reactions to single errors and corruptions. In: Proceedings of the 15th Usenix Conference on File and Storage Technologies, pp. 149–165. USENIX Association, Berkeley (2017)

    Google Scholar 

  12. Bessani, A., Correia, M., Quaresma, B., André, F., Sousa, P.: DepSky: dependable and secure storage in a cloud-of-clouds. ACM Trans. Storage 9(4), 12 (2013). https://doi.org/10.1145/2535929

    Article  Google Scholar 

  13. Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: RACS: a case for cloud storage diversity. In: Proceedings of the 1st ACM Symposium on Cloud computing, pp. 229–240. ACM (2010). https://doi.org/10.1145/1807128.1807165

  14. Chervyakov, N., Babenko, M., Tchernykh, A., Kucherov, N., Miranda-López, V., Cortés-Mendoza, J.M.: AR-RRNS: configurable, scalable and reliable systems for Internet of Things to ensure security. Future Gener. Comput. Syst. 92, 1080–1092 (2019). https://doi.org/10.1016/j.future.2017.09.061

    Article  Google Scholar 

  15. Marium, S., Nazir, Q., Shaikh, A.A., Ahthasham, S., Mehmood, M.A.: Implementation of EAP with RSA for enhancing the security of cloud computing. Int. J. Basic Appl. Sci. 1(3), 177–183 (2012)

    Google Scholar 

  16. Rathanam, G.J., Sumalatha, M.R.: Dynamic secure storage system in cloud services. In: 2014 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 1–5. IEEE (2014). https://doi.org/10.1109/ICRTIT.2014.6996175

  17. Babitha, M.P., Babu, K.R.R.: Secure cloud storage using AES encryption. In: International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, pp. 859–864 (2016)

    Google Scholar 

  18. Tchernykh, A., et al.: Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage. Cluster Comput., 1–13 (2019). https://doi.org/10.1007/s10586-018-02896-9

  19. Miranda-López, V., et al.: Experimental analysis of secret sharing schemes for cloud storage based on RNS. In: Mocskos, E., Nesmachnow, S. (eds.) CARLA 2017. CCIS, vol. 796, pp. 370–383. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-73353-1_26

    Chapter  Google Scholar 

  20. Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169–177. Academic Press (1978)

    Google Scholar 

  21. Gentry, C.: A fully homomorphic encryption scheme (2009)

    Google Scholar 

  22. Tchernykh, A., et al.: AC-RRNS: anti-collusion secured data sharing scheme for cloud storage. Int. J. Approx. Reason. 102, 60–73 (2018). https://doi.org/10.1016/j.ijar.2018.07.010

    Article  MathSciNet  MATH  Google Scholar 

  23. Celesti, A., Fazio, M., Villari, M., Puliafito, A.: Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems. J. Netw. Comput. Appl. 59, 208–218 (2016). https://doi.org/10.1016/j.jnca.2014.09.021

    Article  Google Scholar 

  24. Chang, C.H., Molahosseini, A.S., Zarandi, A.A.E., Tay, T.F.: Residue number systems: a new paradigm to datapath optimization for low-power and high-performance digital signal processing applications. IEEE Circ. Syst. Mag. 15, 26–44 (2015). https://doi.org/10.1109/MCAS.2015.2484118

    Article  Google Scholar 

  25. Tchernykh, A., Schwiegelsohn, U., Talbi, E., Babenko, M.: Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability. J. Comput. Sci. (2016). https://doi.org/10.1016/j.jocs.2016.11.011

  26. Tchernykh, A., Schwiegelsohn, U., Alexandrov, V., Talbi, E.: Towards understanding uncertainty in cloud computing resource provisioning. Procedia Comput. Sci. 51, 1772–1781 (2015). https://doi.org/10.1016/j.procs.2015.05.387

    Article  Google Scholar 

  27. Tchernykh, A., et al.: Towards mitigating uncertainty of data security breaches and collusion in cloud computing. In: Proceedings of UCC 2017, Lyon, France, pp. 137–141. IEEE Press (2017). https://doi.org/10.1109/DEXA.2017.44

  28. Egnyte. https://www.egnyte.com/file-access/desktop-access.html. Accessed 15 Feb 2018

  29. Drago, I., Mellia, M., Munafo, M.M., Sperotto, A., Sadre, R., Pras, A.: Inside dropbox: understanding personal cloud storage services. In: Proceedings of the 2012 Internet Measurement Conference, pp. 481–494. ACM (2012). https://doi.org/10.1145/2398776.2398827

  30. OneDrive. https://onedrive.live.com/about/en-us/. Accessed 15 Feb 2018

  31. GoogleDrive. https://www.google.com/intl/en_us/drive/. Accessed 15 Feb 2018

  32. Box. https://www.box.com/home. Accessed 10 Jan 2018

  33. ShareFile. https://www.citrix.com/products/sharefile/. Accessed 10 Jan 2018

  34. SalesForce. https://www.salesforce.com/eu/products/what-is-salesforce/. Accessed 15 Feb 2018

  35. Google Drive API. https://developers.google.com/api-client-library/java/apis/drive/v2

  36. Dropbox API. https://www.dropbox.com/developers/documentation/java

  37. Box API. http://opensource.box.com/box-java-sdk/

  38. Sharefile API. https://api.sharefile.com/rest/

  39. OneDrive API. https://docs.microsoft.com/en-us/onedrive/developer/rest-api/

  40. Egnyte API. https://developers.egnyte.com/docs/read/Home

  41. Salesforce API. https://developer.salesforce.com/page/REST_API

  42. Apache HttpClient. https://hc.apache.org

  43. CloudHarmony. https://www.networkworld.com/article/3020235/cloud-computing/and-the-cloud-provider-with-the-best-uptime-in-2015-is.html

Download references

Acknowledgments

The work is partially supported by Russian Foundation for Basic Research (RFBR) 18-07-01224 and State task No. 2.6035.2017.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrei Tchernykh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lopez-Falcon, E.C., Miranda-López, V., Tchernykh, A., Babenko, M., Avetisyan, A. (2019). Bi-objective Analysis of an Adaptive Secure Data Storage in a Multi-cloud. In: Meneses, E., Castro, H., Barrios Hernández, C., Ramos-Pollan, R. (eds) High Performance Computing. CARLA 2018. Communications in Computer and Information Science, vol 979. Springer, Cham. https://doi.org/10.1007/978-3-030-16205-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-16205-4_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-16204-7

  • Online ISBN: 978-3-030-16205-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics