Practical Data Integrity Protection in Network-Coded Cloud Storage
|
|
|
- Shauna Joseph
- 10 years ago
- Views:
Transcription
1 Practical Data Integrity Protection in Network-Coded Cloud Storage Henry C. H. Chen Department of Computer Science and Engineering The Chinese University of Hong Kong
2 Outline Introduction FMSR in NCCloud FMSR-DIP Publications Yuchong Hu, Henry C. H. Chen, Patrick P. C. Lee, and Yang Tang NCCloud: Applying Network Coding for the Storage Repair in a Cloud of-clouds Proceedings of the 10th USENIX Conference on File and Storage Technology (FAST 12) Henry C. H. Chen, and Patrick P. C. Lee Practical Data Integrity Protection in Regenerating-Coding-Based Storage To appear in the 31st International Symposium on Reliable Distributed Systems (SRDS 12)
3 Outline Introduction FMSR in NCCloud FMSR-DIP
4 Cloud Storage On-demand storage outsourcing Supports RESTful APIs: PUT, GET, DELETE, LIST
5 Problems in the Cloud
6 Data Integrity Protection Corruption detection Addressed in this work Fault-tolerance and repair Addressed in NCCloud Desirable properties Minimize cost Works on thin clouds (i.e., clouds with only basic file access semantics)
7 Data Integrity Protection Corruption detection Addressed in this work Fault-tolerance and repair Addressed in NCCloud Desirable properties Minimize cost Works on thin clouds (i.e., clouds with only basic file access semantics)
8 Data Integrity Protection Corruption detection Addressed in this work (FMSR-DIP) Fault-tolerance and repair Addressed in NCCloud Desirable properties Minimize cost Works on thin clouds (i.e., clouds with only basic file access semantics)
9 Related Work Single node, smart clouds PDP [Ateniese et al. 07] POR [Juels et al. 07] Multi-node, different storage schemes MR-PDP [Curtmola et al. 08] HAIL [Bowers et al. 09]
10 Our Work Build FMSR-DIP, a corruption detection scheme that allows byte-sampling Works on thin clouds Works on functional minimum storage regenerating (FMSR) code Targets on long-term archives
11 Outline Introduction FMSR in NCCloud FMSR-DIP
12 NCCloud Cloud 1 Users file upload file download Proxy Cloud 2 Cloud 3 Cloud 4
13 Contributions of NCCloud Propose an implementable design of functional minimum storage regenerating (FMSR) code Support basic read/write operations and the repair function on thin clouds Preserve storage requirements as in optimal erasure codes, while reducing repair traffic Implement and evaluate in real cloud storage
14 Repairing a Failed Cloud How to repair: Proxy Cloud 1 Cloud 2 Cloud 3 Cloud 4 Cloud 5 Repair traffic = + + Goal: minimize repair traffic
15 Reed-Solomon Codes Node 1 Node 2 A B A B File of size M Proxy Reed Solomon codes Repair traffic = M Node 3 Node 4 A+B A+2B B A+B A A Conventional repair: n = 4, k = 2 (n, k) MDS code: Any k out of n storage nodes (clouds) can rebuild original file. Reconstruct whole file and generate data in new node
16 FMSR in NCCloud Node 1 Node 2 P1 P2 P3 P4 A B C D File of size M Proxy F-MSR codes Repair traffic = 0.75M Node 3 Node 4 P5 P6 P7 P8 P3 P5 P7 P1 P2 P1 P2 n = 4, k = 2 Code chunk P i = linear combination of original native chunks Repair in FMSR: Download one code chunk from each surviving node Reconstruct new code chunks (via random linear combination) in new node
17 FMSR Property Proxy File partition k(n-k) chunks A B C D encode n(n-k) chunks P1 P2 P3 P4 P5 P6 P7 P8 distribute Storage nodes P1 P2 P3 P4 P5 P6 P7 P8 n=4, k=2
18 FMSR Property Proxy File partition k(n-k) chunks A B C D encode n(n-k) chunks P1 P2 P3 P4 P5 P6 P7 P8 distribute Storage nodes P1 P2 P3 P4 P5 P6 P7 P8 c 1,1 c 1,2 c 1,3 c 1,4... c 8,1 c 8,2 c 8,3 c 8,4 A B C D P1 P2 P3 P4 P5 P6 P7 P8 n=4, k=2 Encoding matrix rank = k(n-k) Native chunks Code chunks
19 NCCloud: Experiments Testbed environment Local cloud Openstack Swift proxy node connected to 15 storage nodes (LAN) NCCloud deployed on proxy node Commercial cloud Microsoft Azure Storage schemes (4,2)-Reed-Solomon vs. (4,2)-FMSR
20 Response time (s) REPAIR Response time (s) DOWNLOAD Response time (s) UPLOAD Response time: Local Cloud RAID-6 RS F-MSR FMSR File size (MB) RAID-6 RS F-MSR FMSR File size (MB) FMSR has higher response time due to encoding/decoding overhead FMSR has slightly less response time in repair, due to less data download RAID-6(native) RS chunk repair) RAID-6(parity) RS (code chunk repair) F-MSR FMSR File size (MB) 20
21 Response time (s) REPAIR Response time (s) DOWNLOAD Response time (s) UPLOAD Response time: Commercial Cloud 6 RAID-6 RS 4 F-MSR FMSR File size (MB) RAID-6 RS F-MSR FMSR File size (MB) No distinct response time difference, as network fluctuations play a bigger role in actual response time RAID-6(native) RS chunk repair) RAID-6(parity) RS (code chunk repair) F-MSR FMSR File size (MB) 21
22 Outline Introduction FMSR in NCCloud FMSR-DIP
23 FMSR-DIP: Design Goals Preserves advantage of FMSR Works on thin clouds Supports sampling to minimize cost Works against a Byzantine, mobile adversary Exhibits arbitrary behaviors Corrupts different subsets of servers over time
24 FMSR-DIP: Overview Cloud 1 Users file upload file download Proxy FMSR- DIP Cloud 2 Cloud 3 Cloud 4 Four operations: Upload, Check, Download and Repair
25 FMSR-DIP: Upload 8 FMSR code chunks, 3 bytes each
26 FMSR-DIP: Upload Apply error-correcting code (ECC) to each chunk individually
27 FMSR-DIP: Upload XOR each byte with a pseudorandom value
28 FMSR-DIP: Upload For each chunk, calculate the MAC of the first 3 bytes
29 FMSR-DIP: Upload Upload the chunks to clouds Encrypt the metadata from NCCloud (which contains the encoding matrix) Append all MACs to metadata Replicate metadata on all nodes
30 FMSR-DIP: Check Pick a row to check
31 FMSR-DIP: Check XOR with the previous pseudorandom values, and check their consistency
32 Recall: FMSR Encoding c 1,1 c 1,2 c 1,3 c 1,4 P 1 c 2,1 c 2,2 c 2,3 c 2,4 c 3,1 c 3,2 c 3,3 c 3,4 A P 2 P 3 c 4,1 c 4,2 c 4,3 c 4,4 B P 4 c 5,1 c 5,2 c 5,3 c 5,4 C P 5 c 6,1 c 6,2 c 6,3 c 6,4 D P 6 c 7,1 c 7,2 c 7,3 c 7,4 c 8,1 c 8,2 c 8,3 c 8,4 Encoding matrix rank = k(n-k) Native chunks P 7 P 8 Code chunks
33 FMSR-DIP: Download Download chunks from any 2 nodes and verify with their MACs
34 FMSR-DIP: Download Remove pseudorandom values and pass to NCCloud for decoding
35 FMSR-DIP: Repair
36 FMSR-DIP: Repair Download 1 chunk from all other nodes and verify with their MACs
37 FMSR-DIP: Repair Remove pseudorandom values and pass to NCCloud
38 FMSR-DIP: Repair NCCloud generates new chunks
39 FMSR-DIP: Repair Process the newly generated chunks as before
40 FMSR-DIP: Repair Upload chunks and update metadata on all nodes
41 FMSR-DIP: Experiments Testbed environment Openstack Swift proxy node connected to 15 storage nodes (LAN) NCCloud and FMSR-DIP deployed on proxy node NCCloud uses RAMDisk as storage Storage scheme (4,2)-FMSR
42 REPAIR Time taken(s) DOWNLOAD Time taken(s) UPLOAD Time taken (s) Running Time vs. File Size 100MB 50MB 20MB 10MB 5MB 1MB Transfer-Up DIP-Encode FMSR File size Transfer-Down DIP-Decode FMSR FMSR-DIP overhead comparable to network transfer time in a LAN environment MB 50MB 20MB 10MB 5MB 1MB 100MB 50MB 20MB 10MB 5MB 1MB File size Transfer-Up Transfer-Down DIP-Encode DIP-Decode FMSR File size
43 Time taken (s) Time taken (s) The Check Operation % check 256B 1KB 4KB 7KB 25KB 256KB Misc. Transfer-Down Rank Checking PRF Download block size Bottleneck in network transfer KB download block size Misc. Transfer-Down Rank Checking PRF 0 100% 75% 50% 25% 10% 5% 1% Checking percentage
44 Conclusions Propose a design for efficient data integrity protection using FMSR on thin clouds Implement and evaluate the efficiency of the design Source code: NCCloud FMSRDIP
45 Thank You!
46 Error Localization Assume each byte is correct in turn
47 Error Localization Form a system with bytes from k other nodes
48 Error Localization Mark all involved bytes as correct if system is consistent
49 Error Localization Try all subsets
50 Error Localization Try all subsets
51 Error Localization And so on
52 Cloud Storage Pricing S3 Rackspace Azure Storage (per GB) $0.125 $0.15 $0.125 Data transfer in (per GB) free free Free Data transfer out (per GB) $0.12 $0.18 $0.12 PUT (per 10,000 requests) $0.10 free $0.01 GET (per 10,000 requests) $0.01 free $0.01 Pricing in US dollars, as of May, 2012
NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds
1 NCCloud: Network-Coding-ased Storage System in a Cloud-of-Clouds Henry C. H. Chen, Yuchong Hu, Patrick P. C. Lee, and Yang Tang bstract To provide fault tolerance for cloud storage, recent studies propose
EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1)
EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1) A.William Walls Research Scholar Department of Computer Science SSM College of Arts and Science Komarapalayam,
Secure Distribution of File on Cloud
Secure Distribution of File on Cloud Niyamat I. Ujloomwale, Ranjana Badre Dept. of Computer, MIT Academy of Engineering, Alandi, Savitri Phule Pune University, Pune, India Dept. of Computer, MIT Academy
NCCloud: Applying Network Coding for the Storage Repair in a Cloud-of-Clouds
NCCloud: pplying Network Coding for the Storage Repair in a Cloud-of-Clouds Yuchong Hu, Henry C. H. Chen, Patrick P. C. Lee, Yang Tang The Chinese University of Hong Kong, Columbia University [email protected],
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
Security of Data from Public - Using Cloud Storage
Security of Data from Public - Using Cloud Storage T.Gopika #1, J.Haripriya #2, R.Ilakiyashri #3, S.Praveenkumar #4 UG Student, Dept. of CSE, Anand Institute of Higher Technology, Chennai, Tamil Nadu,
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department
Functional-Repair-by-Transfer Regenerating Codes
Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can
Data storage security in Cloud
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. III (Nov Dec. 2014), PP 50-56 Data storage security in Cloud Mrs. Niyamat Ujloomwale, Mrs.
Erasure correcting to enhance data security in cloud data storage
Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University [email protected] A.Sajeevram Department of computer science Vels University
Ensuring Data Storage Security in Cloud Computing
Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
Data Corruption In Storage Stack - Review
Theoretical Aspects of Storage Systems Autumn 2009 Chapter 2: Double Disk Failures André Brinkmann Data Corruption in the Storage Stack What are Latent Sector Errors What is Silent Data Corruption Checksum
Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage
Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Nithiavathy.R 1, Suresh.J 2 Department of Computer Science &Engineering, Coimbatore Institute of Engineering and Technology
HAIL: A High-Availability and Integrity Layer for Cloud Storage
HAIL: A High-Availability and Integrity Layer for Cloud Storage Kevin D. Bowers RSA Laboratories [email protected] Ari Juels RSA Laboratories [email protected] Alina Oprea RSA Laboratories [email protected] Abstract
Auditing for Distributed Storage Systems
Auditing for Distributed Storage Systems 1 Anh Le, Member, IEEE Athina Markopoulou, Senior Member, IEEE and Alexandros G. Dimakis, Member, IEEE arxiv:1203.1730v5 [cs.cr] 12 May 2014 Abstract Distributed
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Remote Data Checking for Network Coding-based Distributed Storage Systems
Remote Data Checking for Network Coding-based Distributed Storage Systems Bo Chen, Reza Curtmola Department of Computer Science New Jersey Institute of Technology {bc47,crix}@njit.edu Giuseppe Ateniese,
Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2
Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2 1 Student ME CSE,PREC,Loni,Maharashtra,India 2 Asst.Professor,PREC,Loni, Maharashtra,India
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Currency and Correctness of Content in Object Storage Networks
Currency and Correctness of Content in Object Storage Networks Organization: The Johns Hopkins University 3400 N. Charles St. Baltimore, MD USA 21218 Technical Contacts: Randal Burns 224 New Engineering
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
Reliability and Fault Tolerance in Storage
Reliability and Fault Tolerance in Storage Dalit Naor/ Dima Sotnikov IBM Haifa Research Storage Systems 1 Advanced Topics on Storage Systems - Spring 2014, Tel-Aviv University http://www.eng.tau.ac.il/semcom
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Cloud storage with Apache jclouds
Cloud storage with Apache jclouds Andrew Gaul 19 November 2014 http://jclouds.apache.org/ http://gaul.org/ 1 / 29 Overview What is Apache jclouds What is object storage Basic concepts How to put and get
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com
Parallels Cloud Storage White Paper Performance Benchmark Results www.parallels.com Table of Contents Executive Summary... 3 Architecture Overview... 3 Key Features... 4 No Special Hardware Requirements...
Energy Efficiency in Secure and Dynamic Cloud Storage
Energy Efficiency in Secure and Dynamic Cloud Storage Adilet Kachkeev Ertem Esiner Alptekin Küpçü Öznur Özkasap Koç University Department of Computer Science and Engineering, İstanbul, Turkey {akachkeev,eesiner,akupcu,oozkasap}@ku.edu.tr
Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.
Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,
Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms
Distributed File System 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributed File System Don t move data to workers move workers to the data! Store data on the local disks of nodes
Ensuring Data Storage Security in Cloud Computing
IOSR Journal of Engineering e-issn: 2250-3021, p-issn: 2278-8719, Vol. 2, Issue 12 (Dec. 2012) V2 PP 17-21 Ensuring Data Storage Security in Cloud Computing Rampal Singh, Sawan Kumar, Shani Kumar Agrahari
AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept
Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations
Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant
PORs: Proofs of Retrievability for Large Files
PORs: Proofs of Retrievability for Large Files Ari Juels RSA Laboratories Burt Kaliski EMC Innovation Network ACM CCS Conference, 2007 presented by Serkan Uzunbaz Source: www.rsa.com/rsalabs/node.asp?id=3357
A Secure and Dependable Cloud Storage Service in Cloud Computing
A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model
February. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
TECHNICAL WHITE PAPER: ELASTIC CLOUD STORAGE SOFTWARE ARCHITECTURE
TECHNICAL WHITE PAPER: ELASTIC CLOUD STORAGE SOFTWARE ARCHITECTURE Deploy a modern hyperscale storage platform on commodity infrastructure ABSTRACT This document provides a detailed overview of the EMC
Peer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
Surveying Cloud Storage Correctness using TPA with BLS
Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),
Magnus: Peer to Peer Backup System
Magnus: Peer to Peer Backup System Naveen Gattu, Richard Huang, John Lynn, Huaxia Xia Department of Computer Science University of California, San Diego Abstract Magnus is a peer-to-peer backup system
A Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
DepSky Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa
epsky ependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa University of Lisbon, Faculty of Sciences 1 Moving to Clouds ata is
Distributing, Ensuring and Recovery of Data Stored in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
Today s Papers. RAID Basics (Two optional papers) Array Reliability. EECS 262a Advanced Topics in Computer Systems Lecture 4
EECS 262a Advanced Topics in Computer Systems Lecture 4 Filesystems (Con t) September 15 th, 2014 John Kubiatowicz Electrical Engineering and Computer Sciences University of California, Berkeley Today
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
Secure Storage Services and Erasure Code Implementation in Cloud Servers
Secure Storage Services and Erasure Code Implementation in Cloud Servers G. Rahul Reddy 1, N. J. Subashini 2 1 Research Scholar, M.Tech, Cloud Computing, Dept of Information Technology, SRM University,
Coding Techniques for Efficient, Reliable Networked Distributed Storage in Data Centers
Coding Techniques for Efficient, Reliable Networked Distributed Storage in Data Centers Anwitaman Datta Joint work with Frédérique Oggier (SPMS) School of Computer Engineering Nanyang Technological University
Data Protection Technologies: What comes after RAID? Vladimir Sapunenko, INFN-CNAF HEPiX Spring 2012 Workshop
Data Protection Technologies: What comes after RAID? Vladimir Sapunenko, INFN-CNAF HEPiX Spring 2012 Workshop Arguments to be discussed Scaling storage for clouds Is RAID dead? Erasure coding as RAID replacement
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
Enhance Data Security in Cloud Computing using Layered Interleaving Approach
Enhance Data Security in Cloud Computing using Layered Interleaving Approach Mr. Pradeep Semwal Assistant Professor Dept of Computer Application & IT SGRR-Institute of Technology & Sciences, Dehradun Mr.
Load Re-Balancing for Distributed File. System with Replication Strategies in Cloud
Contemporary Engineering Sciences, Vol. 8, 2015, no. 10, 447-451 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2015.5263 Load Re-Balancing for Distributed File System with Replication Strategies
Service Description Cloud Storage Openstack Swift
Service Description Cloud Storage Openstack Swift Table of Contents Overview iomart Cloud Storage... 3 iomart Cloud Storage Features... 3 Technical Features... 3 Proxy... 3 Storage Servers... 4 Consistency
Exercise 2 : checksums, RAID and erasure coding
Exercise 2 : checksums, RAID and erasure coding Sébastien Ponce May 22, 2015 1 Goals of the exercise Play with checksums and compare efficiency and robustness Use hand written version of RAID systems and
Data Security And Integrity Of Cloud Storage In Cloud Computing
Data Security And Integrity Of Cloud Storage In Cloud Computing Yogita Gunjal 1, Prof. J.Rethna Virjil Jeny 2 ME.student, Dept. Of Information technology, Amrutvahini College of Engineering,Sangamner,
How To Check If A Data File Is Safe In A Cloud Archive
Evaluate the Performance of Data Integrity Proofs in Cloud Storage 1 D. Hari Krishna, 2 R. Pushpa Latha, 3 J. Srinivasa Rao 1,2,3 Dept. of CSE, NOVA College of Engineering & Tech., Vijayawada, AP, India
www.basho.com Technical Overview Simple, Scalable, Object Storage Software
www.basho.com Technical Overview Simple, Scalable, Object Storage Software Table of Contents Table of Contents... 1 Introduction & Overview... 1 Architecture... 2 How it Works... 2 APIs and Interfaces...
CERN Cloud Storage Evaluation Geoffray Adde, Dirk Duellmann, Maitane Zotes CERN IT
SS Data & Storage CERN Cloud Storage Evaluation Geoffray Adde, Dirk Duellmann, Maitane Zotes CERN IT HEPiX Fall 2012 Workshop October 15-19, 2012 Institute of High Energy Physics, Beijing, China SS Outline
ESPRESSO: An Encryption as a Service for Cloud Storage Systems
8th International Conference on Autonomous Infrastructure, Management and Security ESPRESSO: An Encryption as a Service for Cloud Storage Systems Kang Seungmin 30 th Jun., 2014 Outline Introduction and
A Secure Cloud Backup System with Assured Deletion and Version Control
A Secure Cloud Backup System with Assured Deletion and Version Control Arthur Rahumed, Henry C. H. Chen, Yang Tang, Patrick P. C. Lee, and John C. S. Lui The Chinese University of Hong Kong, Hong Kong
A Survey on Secure Auditing and Deduplicating Data in Cloud
A Survey on Secure Auditing and Deduplicating Data in Cloud Tejaswini Jaybhaye 1 ; D. H. Kulkarni 2 PG Student, Dept. of Computer Engineering, SKNCOE, Pune, India 1 Assistant Professor, Dept. of Computer
How To Ensure Data Integrity In Cloud Computing
A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad
Chapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
Chapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING
AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING Mrs. J. Pavithra 1 Mr. A. Naveen 2 1 (MRIT, Hyderabad, India, [email protected]) 2 (Asst. Professor, MRIT, Hyderabad, India, [email protected])
Distributed Storage Networks and Computer Forensics
Distributed Storage Networks 5 Raid-6 Encoding Technical Faculty Winter Semester 2011/12 RAID Redundant Array of Independent Disks Patterson, Gibson, Katz, A Case for Redundant Array of Inexpensive Disks,
Building Storage Clouds for Online Applications A Case for Optimized Object Storage
Building Storage Clouds for Online Applications A Case for Optimized Object Storage Agenda Introduction: storage facts and trends Call for more online storage! AmpliStor: Optimized Object Storage Cost
A Survey on Data Integrity of Cloud Storage in Cloud Computing
A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. [email protected],
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Christian Schindelhauer
Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Institut für Informatik Wintersemester 2007/08 RAID Redundant Array of Independent Disks Patterson, Gibson, Katz, A Case for Redundant
Aspera Direct-to-Cloud Storage WHITE PAPER
Transport Direct-to-Cloud Storage and Support for Third Party April 2014 WHITE PAPER TABLE OF CONTENTS OVERVIEW 3 1 - THE PROBLEM 3 2 - A FUNDAMENTAL SOLUTION - ASPERA DIRECT-TO-CLOUD TRANSPORT 5 3 - VALIDATION
Survey on Secrecy-Protective Communal Accounting for Restoring-Key-Based Cloud Storage
Survey on Secrecy-Protective Communal Accounting for Restoring-Key-Based Cloud Storage Ankita A. Lande 1, Dr.P.K.Deshmukh 2 1[Department Of Computer Engineering, JSPM s RSCOE, Pune ] 2[Department Of Computer
