Skip to main content

Data Storage Security Model for Cloud Computing

  • Conference paper
Advances in Communication, Network, and Computing (CNC 2012)

Abstract

Data security is one of the biggest concerns in adopting Cloud computing. In Cloud environment, users remotely store their data and relieve themselves from the hassle of local storage and maintenance. However, in this process, they lose control over their data. Existing approaches do not take all the facets into consideration viz. dynamic nature of Cloud, computation & communication overhead etc. In this paper, we propose a Data Storage Security Model to achieve storage correctness incorporating Cloud’s dynamic nature while maintaining low computation and communication cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, FC 2010, pp. 136–149. Springer, Heidelberg (2010)

    Google Scholar 

  2. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings IEEE INFOCOM, vol. 54(2), pp. 1–9 (2010)

    Google Scholar 

  3. Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. Cryptology ePrint Archive, Report 2009/081 (2009)

    Google Scholar 

  4. Wei, L., Zhu, H., Cao, Z., Jia, W., Vasilakos, A.V.: Seccloud: Bridging secure storage and computation in cloud. In: Distributed Computing Systems Workshops (2010)

    Google Scholar 

  5. Chuang, I.H., Li, S.H., Huang, K.C., Kuo, Y.H.: An effective privacy protection scheme for cloud computing. In: 2011 13th International Conference on Advanced Communication Technology (ICACT), pp. 260–265 (2011)

    Google Scholar 

  6. Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. In: Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2009, pp. 711–716. IEEE Computer Society, Washington, DC (2009)

    Chapter  Google Scholar 

  7. Cheng, G., Ohoussou, A.: Sealed storage for trusted cloud computing. In: International Conference on Computer Design and Applications (ICCDA), vol. 5, pp. V5-335 –V5-339 (2010)

    Google Scholar 

  8. Pearson, S., Shen, Y., Mowbray, M.: A Privacy Manager for Cloud Computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 90–106. Springer, Heidelberg (2009)

    Google Scholar 

  9. Li, W., Ping, L.: Trust Model to Enhance Security and Interoperability of Cloud Environment. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 69–79. Springer, Heidelberg (2009)

    Google Scholar 

  10. Tribhuwan, M., Bhuyar, V., Pirzade, S.: Ensuring data storage security in cloud computing through two-way handshake based on token management. In: 2010 International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom), pp. 386–389 (2010)

    Google Scholar 

  11. Ram, C., Sreenivaasan, G.: Security as a service (sass): Securing user data by coprocessor and distributing the data. In: Trendz in Information Sciences Computing (TISC), pp. 152–155 (2010)

    Google Scholar 

  12. Gowrigolla, B., Sivaji, S., Masillamani, M.: Design and auditing of cloud computing security. In: 2010 5th International Conference on Information and Automation for Sustainability (ICIAFs), pp. 292–297 (2010)

    Google Scholar 

  13. Xu, J.-S., Huang, R.-C., Huang, W.-M., Yang, G.: Secure Document Service for Cloud Computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 541–546. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  14. Yu, X., Wen, Q.: A view about cloud data security from data life cycle. In: 2010 International Conference on Computational Intelligence and Software Engineering (CiSE), pp. 1–4 (2010)

    Google Scholar 

  15. Juels, A., Kaliski Jr., B.S.: Pors: proofs of retrievability for large files. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 584–597. ACM (2007)

    Google Scholar 

  16. Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to keep online storage services honest. In: Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems, pp. 11:1–11:6. USENIX Association, Berkeley (2007)

    Google Scholar 

  17. 104th United States Congress: Health Insurance Portability and Accountability Act of 1996 (HIPPA) (1996), http://aspe.hhs.gov/admnsimp/pl104191.htm

  18. Advanced encryption standard (AES) (FIPS pub. 197) (2001)

    Google Scholar 

  19. FIPS 46-3: Data Encryption Standard (DES). (fips pub 46-3) (1999)

    Google Scholar 

  20. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  21. Certicom Research. Standards for efficient cryptography, SEC 1: Elliptic curve cryptography, Version 1.0 (2000), http://www.secg.org/

  22. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, p. 89 (2006)

    Google Scholar 

  23. Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communication Security, CCS 2007, pp. 195–203. ACM, New York (2007)

    Google Scholar 

  24. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 598–609. ACM, NY (2007)

    Google Scholar 

  25. Rivest, R.: The md5 message-digest algorithm (1992)

    Google Scholar 

  26. Institute of standards and technology, N.: FIPS 180-2, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-2. Tech. rep., Department Of Commerce (2002)

    Google Scholar 

  27. Neuman, B.M., Miller, S.P., Neuman, B.C., Schiller, J.I., Saltzer, J.H.: Section e.2.1 kerberos authentication and authorization system. Project Athena Technical Plan (1987)

    Google Scholar 

  28. Housley, R., Ford, W., Polk, W., Solo, D.: Internet x.509 public key infrastructure certificate and crl profile (1999)

    Google Scholar 

  29. Sanka, S., Hota, C., Rajarajan, M.: Secure Data Access in Cloud Computing. In: 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application(IMSAA), pp. 1–6 (2010)

    Google Scholar 

  30. Triple data encryption algorithm. Technical Report Federal Information Processing Standard Publication 46-3, standard ANSI X9.52-1998, NIST (1998)

    Google Scholar 

  31. Rescorla, E.: Diffie-Hellman Key Agreement Method. RFC2631 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Patel, H.B., Patel, D.R., Borisaniya, B., Patel, A. (2012). Data Storage Security Model for Cloud Computing. In: Das, V.V., Stephen, J. (eds) Advances in Communication, Network, and Computing. CNC 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 108. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35615-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35615-5_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35614-8

  • Online ISBN: 978-3-642-35615-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics