Abstract
The semi-trusted servers in cloud environment may outsource the files of their clients to some low expensive servers to increase their profit. To some extent, such behavior may violate the wishes of cloud users and impair their legitimate rights and interests. In this paper, a probabilistic challenge-response scheme is proposed to prove that the clients’ files are available and stored in a specified cloud server. In order to resist the collusion of cloud servers, common cloud infrastructure with some reasonable limits, such as rational economic security model, semi-collusion security model and response time bound, are exploited. These limits guarantee that a malicious cloud server could not conduct a t-round communication in a finite time. We analyze the security and performance of the proposed scheme and demonstrate that our scheme provides strong incentives for economically rational cloud providers against re-outsourcing the clients’ data to some other cloud providers.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proc. of ACM CCS, Virginia, USA, pp. 598–609 (October 2007)
Ateniese, G., et al.: Scalable and efficient provable data possession. In: Proc. of SecureComm, VA, USA, pp. 1–10 (September 2008)
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing effficient protocols. In: Proc. of ACM CCS, VA, USA, pp. 62–73 (November 1993)
Bowers, K.D., et al.: How to tell if your cloud files are vulnerable to drive crashes. In: Proceedings of the ACM Conference on Computer and Communications Security, IL, USA, pp. 501–514 (October 2011)
Capkun, S., Cagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: Proceedings of the IEEE International Conference on Computer Communications, Catalunya, Spain, pp. 1–10 (April 2006)
Chen, X., Li, J., Susilo, W.: Efficient fair conditional payments for outsourcing computations. IEEE Transactions on Information Forensics and Security 7(6), 1687–1694 (2012)
Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 541–556. Springer, Heidelberg (2012)
Commission, E.: Regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. general data protection regulation, directive 95/46/EC (2012)
Coron, J.-S.: On the exact security of full domain hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229–235. Springer, Heidelberg (2000)
Deswarte, Y., Quisquater, J.J., Saidane, A.: Remote integrity checking. In: Proc. of Conference on Integrity and Internal Control in Information Systems (IICIS 2003), Lausanne, Switzerland, pp. 1–11 (November 2003)
Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109–127. Springer, Heidelberg (2009)
Dubnicki, C., et al.: Hydrastor a scalable secondary storage. In: Proc. of the 7th USENIX Conference on File and Storage Technologies, CA, USA, pp. 197–210 (February 2009)
Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proc. of ACM CCS. pp. 213–222. Illinois, USA (November 2009)
Filho, D.L.G., Baretto, P.S.L.M.: Demonstrating data possession and uncheatable data transfer. IACR ePrint archive 2006 (2006), http://eprint.iacr.org/2006/150
Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proof of ownership in remote storage system. In: Proc. of ACM CCS, Illinois, USA, pp. 491–500 (October 2011)
Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: Deduplication in cloud storage. In: Proc. of IEEE Security & Privicy, CA, USA, pp. 40–47 (November 2010)
Jansma, N., Arrendondo, B.: Performance comparison of elliptic curve and rsa digital signatures. Tech. Rep. MI, University of Michigan, Ann Arbor (May 2004)
Juels, A., Kaliski, B.S.: Pors: Proofs of retrievability for large files. In: Proc. of ACM CCS, Virginia, USA, pp. 584–597 (2007)
Laki, S., et al.: A detailed path-latency model for router geolocation. In: The International Conference on Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, DC, USA, pp. 1–6 (April 2009)
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Papagiannaki, K., et al.: Provable data possession at untrusted stores. In: Proc. IEEE INFOCOM 2002, NY, USA, pp. 535–544 (June 2002)
Schwarz, T.S.J., Miller, E.L.: Store, forget, and check: Using algebraic signatures to check remotely administered storage. In: Proceedings of ICDCS 2006, Lisboa, Portugal, pp. 1–12 (July 2006)
Sebe, F., et al.: Time-bounded remote file integrity checking. Tech. Rep. 04429, Universitat Rovira i Virgili, Tarragona, Spain (July 2004)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proc. of ASIACRYP- T, Melbourne, Australia, pp. 90–107 (December 2008)
Ungureanu, C., et al.: Hydrafs A high-throughput file system for the hydrastor content-addressable storage system. In: Proc. of the 8th USENIX Conference on File and Storage Technologies, CA, USA, p. 17 (February 2010)
Wong, B., Stoyanov, I., Sirer, E.G.: Octant: A comprehensive framework for the geolocalization of internet hosts. In: Proceedings of the USENIX Networked Systems Design and Implementation, MA, USA, pp. 313–326 (April 2007)
Yamamoto, G., Fujisaki, E., Abe, M.: An efficiently-verifiable zero-knowledge argument for proofs of knowledge. IEICE Technical Report ISEC2005-48 105, 41–45 (July 2005)
Zhang, F., Kim, K.: Efficient id-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Jiang, T., Chen, X., Li, J., Wong, D.S., Ma, J., Liu, J. (2014). TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. In: Huang, X., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2014. Lecture Notes in Computer Science, vol 8434. Springer, Cham. https://doi.org/10.1007/978-3-319-06320-1_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-06320-1_26
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06319-5
Online ISBN: 978-3-319-06320-1
eBook Packages: Computer ScienceComputer Science (R0)