Abstract
Data security is one of the biggest concerns in adopting Cloud computing. In Cloud environment, users remotely store their data and relieve themselves from the hassle of local storage and maintenance. However, in this process, they lose control over their data. Existing approaches do not take all the facets into consideration viz. dynamic nature of Cloud, computation & communication overhead etc. In this paper, we propose a Data Storage Security Model to achieve storage correctness incorporating Cloud’s dynamic nature while maintaining low computation and communication cost.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, FC 2010, pp. 136–149. Springer, Heidelberg (2010)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings IEEE INFOCOM, vol. 54(2), pp. 1–9 (2010)
Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. Cryptology ePrint Archive, Report 2009/081 (2009)
Wei, L., Zhu, H., Cao, Z., Jia, W., Vasilakos, A.V.: Seccloud: Bridging secure storage and computation in cloud. In: Distributed Computing Systems Workshops (2010)
Chuang, I.H., Li, S.H., Huang, K.C., Kuo, Y.H.: An effective privacy protection scheme for cloud computing. In: 2011 13th International Conference on Advanced Communication Technology (ICACT), pp. 260–265 (2011)
Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. In: Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2009, pp. 711–716. IEEE Computer Society, Washington, DC (2009)
Cheng, G., Ohoussou, A.: Sealed storage for trusted cloud computing. In: International Conference on Computer Design and Applications (ICCDA), vol. 5, pp. V5-335 –V5-339 (2010)
Pearson, S., Shen, Y., Mowbray, M.: A Privacy Manager for Cloud Computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 90–106. Springer, Heidelberg (2009)
Li, W., Ping, L.: Trust Model to Enhance Security and Interoperability of Cloud Environment. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 69–79. Springer, Heidelberg (2009)
Tribhuwan, M., Bhuyar, V., Pirzade, S.: Ensuring data storage security in cloud computing through two-way handshake based on token management. In: 2010 International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom), pp. 386–389 (2010)
Ram, C., Sreenivaasan, G.: Security as a service (sass): Securing user data by coprocessor and distributing the data. In: Trendz in Information Sciences Computing (TISC), pp. 152–155 (2010)
Gowrigolla, B., Sivaji, S., Masillamani, M.: Design and auditing of cloud computing security. In: 2010 5th International Conference on Information and Automation for Sustainability (ICIAFs), pp. 292–297 (2010)
Xu, J.-S., Huang, R.-C., Huang, W.-M., Yang, G.: Secure Document Service for Cloud Computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 541–546. Springer, Heidelberg (2009)
Yu, X., Wen, Q.: A view about cloud data security from data life cycle. In: 2010 International Conference on Computational Intelligence and Software Engineering (CiSE), pp. 1–4 (2010)
Juels, A., Kaliski Jr., B.S.: Pors: proofs of retrievability for large files. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 584–597. ACM (2007)
Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to keep online storage services honest. In: Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems, pp. 11:1–11:6. USENIX Association, Berkeley (2007)
104th United States Congress: Health Insurance Portability and Accountability Act of 1996 (HIPPA) (1996), http://aspe.hhs.gov/admnsimp/pl104191.htm
Advanced encryption standard (AES) (FIPS pub. 197) (2001)
FIPS 46-3: Data Encryption Standard (DES). (fips pub 46-3) (1999)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)
Certicom Research. Standards for efficient cryptography, SEC 1: Elliptic curve cryptography, Version 1.0 (2000), http://www.secg.org/
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, p. 89 (2006)
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communication Security, CCS 2007, pp. 195–203. ACM, New York (2007)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 598–609. ACM, NY (2007)
Rivest, R.: The md5 message-digest algorithm (1992)
Institute of standards and technology, N.: FIPS 180-2, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-2. Tech. rep., Department Of Commerce (2002)
Neuman, B.M., Miller, S.P., Neuman, B.C., Schiller, J.I., Saltzer, J.H.: Section e.2.1 kerberos authentication and authorization system. Project Athena Technical Plan (1987)
Housley, R., Ford, W., Polk, W., Solo, D.: Internet x.509 public key infrastructure certificate and crl profile (1999)
Sanka, S., Hota, C., Rajarajan, M.: Secure Data Access in Cloud Computing. In: 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application(IMSAA), pp. 1–6 (2010)
Triple data encryption algorithm. Technical Report Federal Information Processing Standard Publication 46-3, standard ANSI X9.52-1998, NIST (1998)
Rescorla, E.: Diffie-Hellman Key Agreement Method. RFC2631 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Patel, H.B., Patel, D.R., Borisaniya, B., Patel, A. (2012). Data Storage Security Model for Cloud Computing. In: Das, V.V., Stephen, J. (eds) Advances in Communication, Network, and Computing. CNC 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 108. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35615-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-35615-5_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35614-8
Online ISBN: 978-3-642-35615-5
eBook Packages: Computer ScienceComputer Science (R0)