Replication for dependability on virtualized cloud environments
Proceedings of the 10th International Workshop on Middleware for Grids, Clouds and e-Science
International Journal of Cloud Applications and Computing
DCSP-MC: dependable cloud-based storage platform for mobile computing
International Journal of Networking and Virtual Organisations
Efficient integrity auditing services for cloud computing using raptor codes
Proceedings of the 2013 Research in Adaptive and Convergent Systems
An E-learning System Based on Secure Data Storage Services in Cloud Computing
International Journal of Information Technology and Web Engineering
On the security of auditing mechanisms for secure cloud storage
Future Generation Computer Systems
Future Generation Computer Systems
Learning management systems and cloud file hosting services: A study on students' acceptance
Computers in Human Behavior
Hi-index | 0.00 |
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.