Skip to main content

TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing

  • Conference paper
Information Security Practice and Experience (ISPEC 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8434))

Abstract

The semi-trusted servers in cloud environment may outsource the files of their clients to some low expensive servers to increase their profit. To some extent, such behavior may violate the wishes of cloud users and impair their legitimate rights and interests. In this paper, a probabilistic challenge-response scheme is proposed to prove that the clients’ files are available and stored in a specified cloud server. In order to resist the collusion of cloud servers, common cloud infrastructure with some reasonable limits, such as rational economic security model, semi-collusion security model and response time bound, are exploited. These limits guarantee that a malicious cloud server could not conduct a t-round communication in a finite time. We analyze the security and performance of the proposed scheme and demonstrate that our scheme provides strong incentives for economically rational cloud providers against re-outsourcing the clients’ data to some other cloud providers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proc. of ACM CCS, Virginia, USA, pp. 598–609 (October 2007)

    Google Scholar 

  2. Ateniese, G., et al.: Scalable and efficient provable data possession. In: Proc. of SecureComm, VA, USA, pp. 1–10 (September 2008)

    Google Scholar 

  3. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing effficient protocols. In: Proc. of ACM CCS, VA, USA, pp. 62–73 (November 1993)

    Google Scholar 

  4. Bowers, K.D., et al.: How to tell if your cloud files are vulnerable to drive crashes. In: Proceedings of the ACM Conference on Computer and Communications Security, IL, USA, pp. 501–514 (October 2011)

    Google Scholar 

  5. Capkun, S., Cagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: Proceedings of the IEEE International Conference on Computer Communications, Catalunya, Spain, pp. 1–10 (April 2006)

    Google Scholar 

  6. Chen, X., Li, J., Susilo, W.: Efficient fair conditional payments for outsourcing computations. IEEE Transactions on Information Forensics and Security 7(6), 1687–1694 (2012)

    Google Scholar 

  7. Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 541–556. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  8. Commission, E.: Regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. general data protection regulation, directive 95/46/EC (2012)

    Google Scholar 

  9. Coron, J.-S.: On the exact security of full domain hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229–235. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  10. Deswarte, Y., Quisquater, J.J., Saidane, A.: Remote integrity checking. In: Proc. of Conference on Integrity and Internal Control in Information Systems (IICIS 2003), Lausanne, Switzerland, pp. 1–11 (November 2003)

    Google Scholar 

  11. Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109–127. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Dubnicki, C., et al.: Hydrastor a scalable secondary storage. In: Proc. of the 7th USENIX Conference on File and Storage Technologies, CA, USA, pp. 197–210 (February 2009)

    Google Scholar 

  13. Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proc. of ACM CCS. pp. 213–222. Illinois, USA (November 2009)

    Google Scholar 

  14. Filho, D.L.G., Baretto, P.S.L.M.: Demonstrating data possession and uncheatable data transfer. IACR ePrint archive 2006 (2006), http://eprint.iacr.org/2006/150

  15. Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proof of ownership in remote storage system. In: Proc. of ACM CCS, Illinois, USA, pp. 491–500 (October 2011)

    Google Scholar 

  16. Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: Deduplication in cloud storage. In: Proc. of IEEE Security & Privicy, CA, USA, pp. 40–47 (November 2010)

    Google Scholar 

  17. Jansma, N., Arrendondo, B.: Performance comparison of elliptic curve and rsa digital signatures. Tech. Rep. MI, University of Michigan, Ann Arbor (May 2004)

    Google Scholar 

  18. Juels, A., Kaliski, B.S.: Pors: Proofs of retrievability for large files. In: Proc. of ACM CCS, Virginia, USA, pp. 584–597 (2007)

    Google Scholar 

  19. Laki, S., et al.: A detailed path-latency model for router geolocation. In: The International Conference on Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, DC, USA, pp. 1–6 (April 2009)

    Google Scholar 

  20. Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  21. Papagiannaki, K., et al.: Provable data possession at untrusted stores. In: Proc. IEEE INFOCOM 2002, NY, USA, pp. 535–544 (June 2002)

    Google Scholar 

  22. Schwarz, T.S.J., Miller, E.L.: Store, forget, and check: Using algebraic signatures to check remotely administered storage. In: Proceedings of ICDCS 2006, Lisboa, Portugal, pp. 1–12 (July 2006)

    Google Scholar 

  23. Sebe, F., et al.: Time-bounded remote file integrity checking. Tech. Rep. 04429, Universitat Rovira i Virgili, Tarragona, Spain (July 2004)

    Google Scholar 

  24. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proc. of ASIACRYP- T, Melbourne, Australia, pp. 90–107 (December 2008)

    Google Scholar 

  25. Ungureanu, C., et al.: Hydrafs A high-throughput file system for the hydrastor content-addressable storage system. In: Proc. of the 8th USENIX Conference on File and Storage Technologies, CA, USA, p. 17 (February 2010)

    Google Scholar 

  26. Wong, B., Stoyanov, I., Sirer, E.G.: Octant: A comprehensive framework for the geolocalization of internet hosts. In: Proceedings of the USENIX Networked Systems Design and Implementation, MA, USA, pp. 313–326 (April 2007)

    Google Scholar 

  27. Yamamoto, G., Fujisaki, E., Abe, M.: An efficiently-verifiable zero-knowledge argument for proofs of knowledge. IEICE Technical Report ISEC2005-48 105, 41–45 (July 2005)

    Google Scholar 

  28. Zhang, F., Kim, K.: Efficient id-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Jiang, T., Chen, X., Li, J., Wong, D.S., Ma, J., Liu, J. (2014). TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. In: Huang, X., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2014. Lecture Notes in Computer Science, vol 8434. Springer, Cham. https://doi.org/10.1007/978-3-319-06320-1_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06320-1_26

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06319-5

  • Online ISBN: 978-3-319-06320-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics