Proofs of Physical Reliability for Cloud Storage Systems

被引:1
|
作者
Li, Li [1 ]
Lazos, Loukas [1 ]
机构
[1] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ 85721 USA
基金
美国国家科学基金会;
关键词
Delays; Protocols; Security; Layout; Data centers; Fault tolerance; Proof of reliability; fault tolerance; data integrity; data security and privacy; storage reliability; retrievability; RETRIEVABILITY;
D O I
10.1109/TPDS.2019.2958919
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud service providers (CSPs) promise to reliably store repositories outsourced by clients. Unfortunately, once files have left the client's control, he has no means to verify their redundant storage. In this article, we develop Proof of Physical Reliability (PoPR) auditing mechanisms that prove that a CSP stores an outsourced repository across multiple physical storage nodes. A PoPR complements the existing proof-of-retrievability (PoR) and proof-of-data possession (PDP) methods that are concerned with file retrievability, but without any verification of the fault-tolerance to physical storage nodes failures. A PoPR goes beyond retrievability by verifying that a file is redundantly stored across multiple physical storage nodes according to a pre-agreed layout and can, therefore, survive node failures. The verification mechanism relies on a combination of storage integrity and timing tests on the simultaneous retrieval of a collection of file symbols from multiple storage nodes. Compared to the state-of-the-art, our approach accommodates CSPs with heterogeneous storage devices (hard disks, SSDs, etc.) and does not assume constant data processing nor network delays. Instead, it can operate under any delay variance, because it relies only on (loose) delay bounds. We analytically prove the security of our construction and experimentally validate its success in heterogeneous storage settings.
引用
收藏
页码:1048 / 1065
页数:18
相关论文
共 50 条
  • [1] Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
    Ren, Zhengwei
    Wang, Lina
    Wang, Qian
    Xu, Mingdi
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2018, 11 (04) : 685 - 698
  • [2] Proofs of Ownership and Retrievability in Cloud Storage
    Du, Ruiying
    Deng, Lan
    Chen, Jing
    He, Kun
    Zheng, Minghui
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 328 - 335
  • [3] Reliability of Geo-Replicated Cloud Storage Systems
    Iliadis, Ilias
    Sotnikov, Dmitry
    Ta-Shma, Paula
    Venkatesan, Vinodh
    [J]. 2014 20TH IEEE PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2014), 2014, : 169 - 179
  • [4] A Survey and a Data Integrity Proofs In Cloud Storage
    Kiruthika, V.
    Sree, B. R. Laxmi
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (11): : 39 - 44
  • [5] Revocation Basis and Proofs Access Control for Cloud Storage Multi-Authority Systems
    Riad, Khaled
    [J]. 2016 THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND PATTERN RECOGNITION (AIPR), 2016,
  • [6] Reliability Equations for Cloud Storage Systems with Proactive Fault Tolerance
    Li, Jing
    Li, Peng
    Stones, Rebecca J.
    Wang, Gang
    Li, Zhongwei
    Liu, Xiaoguang
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (04) : 782 - 794
  • [7] Reliability assessment of data storage in cyber physical systems
    Jia, Heping
    Ding, Yi
    Peng, Rui
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON SYSTEM RELIABILITY AND SAFETY (ICSRS), 2018, : 62 - 66
  • [8] Zero knowledge Proofs for Cloud Storage Integrity Checking
    Zhang, Faen
    Fan, Xinyu
    Lei, Xiang
    Wu, Jiahong
    Song, Jianfei
    Huang, Jiashui
    Guo, Jingming
    Tong, Chao
    [J]. PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7661 - 7668
  • [9] Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
    Xu, Jia
    Zhou, Jianying
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 97 - 115
  • [10] Proofs of Ownership in Remote Storage Systems
    Halevi, Shai
    Harnik, Danny
    Pinkas, Benny
    shulman-peleg, Alexandra
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 491 - 500