Ensuring Data Storage Security in Cloud Computing

Similar documents
Secure Way of Storing Data in Cloud Using Third Party Auditor

How To Ensure Correctness Of Data In The Cloud

Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

How To Ensure Correctness Of Data In The Cloud

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Distributing, Ensuring and Recovery of Data Stored in Cloud

How To Design A Cloud Data Storage Service For A Cloud Computer System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing

Index Terms: Data integrity, dependable distributed storage, Cloud Computing

Erasure correcting to enhance data security in cloud data storage

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

An Efficient Data Correctness Approach over Cloud Architectures

Privacy preserving technique to secure cloud

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

A Secure and Dependable Cloud Storage Service in Cloud Computing

Dependable and Secure Storage Services in Cloud Computing

Data storage security in Cloud

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

February. ISSN:

Analysis of Secure Cloud Data Sharing Within a Group

ADVANCE SECURITY TO CLOUD DATA STORAGE

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

Improving data integrity on cloud storage services

Secure Distribution of File on Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Ensuring Data Storage Security in Cloud Computing

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING

Enhance Data Security in Cloud Computing using Layered Interleaving Approach

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Enhancing Data Integrity in Cloud Storage by Ensuring Maximum Availability

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

Data Security And Integrity Of Cloud Storage In Cloud Computing

Enable Public Audit ability for Secure Cloud Storage

Cloud Data Storage Services Considering Public Audit for Security

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Secure Storage Services and Erasure Code Implementation in Cloud Servers

Data Security in Cloud Using Elliptic Curve Crytography

Verifying Correctness of Trusted data in Clouds

Monitoring Data Integrity while using TPA in Cloud Environment

Cryptographic Data Security over Cloud

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Survey Paper on Integrity Auditing of Storage

Keywords Cloud Computing, Cloud computing Architecture, Intruder, Security Issues.

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Security in Data Storage and Transmission in Cloud Computing

A survey on cost effective multi-cloud storage in cloud computing

How To Check If A Data File Is Safe In A Cloud Archive

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Enabling Public Auditing for Secured Data Storage in Cloud Computing

A Survey on Data Integrity of Cloud Storage in Cloud Computing

Chapter 1 Introduction

Data Integrity and Dynamic Storage Way in Cloud Computing

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

A Novel Method for Storage Security in Cloud Computing D. Kanchana, Dr. S. Dhandapani

Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.

Ensuring Data Integrity in Cloud Computing

Trusted Public Auditing Process for Secure Cloud Storage

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

IJCSIET-ISSUE4-VOLUME2-SERIES1 Page 1

A Review on Towards Audit of Secure Storage Correctness Verification and Dependable Storage Error Recovery in Cloud Computing

International Journal of Advanced Research in Computer Science and Software Engineering

Secure Privacy Preserving Public Auditing for Cloud storage

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

Transcription:

Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute

Outline Cloud Computing and Its Security Challenges Data Storage Security in Cloud Computing Our Approach Evaluation Concluding Remarks

Cloud Computing Background Cloud computing has been envisioned as the nextgeneration architecture of IT enterprise. on-demand self-service, ubiquitous network access, location independent resource pooling, rapid resource elasticity, usage-based pricing and transference of risk Prediction from Market-research firm IDC, cloud-computing revenue will increase from US $16.2 billion to 42.3 billion during the next few years. Image from: Neal Leavitt, "Is Cloud Computing Really Ready for Prime Time?," Computer, vol. 42, no. 1, pp. 15-20, January, 2009.

Cloud Computing Background Along with the coming of Cloud Computing is its untested deployment, correlated adversarial models and vulnerabilities: Secure resource virtualization Practical integrity mechanisms for data outsourcing Secure computation outsourcing Business and security risk models and clouds Secure data management outsourcing and many It is imperative that our community gets involved at this early stage and do it right for the first time!

Outline Cloud Computing Background Data Storage Security in Cloud Computing Our Approach Evaluation Concluding Remarks

Overview for Data Storage in Cloud From user s perspective, data outsourcing brings: Relief of the burden for storage management universal access to data, independent of location lower capital expenditure (CapEx) on hardware, software and services Data outsourcing also eliminates users ultimate control over the fate of their data.

Shall We Trust the Cloud for data integrity? Broad range of threats for data integrity still exist: Internal: Byzantine failure, management errors, software bugs etc. External: malicious malware, economically motivated attacks etc. Motivation for the Cloud service providers to cheat: Discard rarely accessed data for monetary reason Hide data loss incident for reputation. While cloud data storage is economically attractive for the costs and complexity of long-term large-scale data storage, it doesn t offer guarantees on data integrity and availability.

Problem Description Users should be equipped with security means so that they can make continuous correctness assurance of their stored data. Data integrity auditing tasks, if necessary, can be delegated to an optional Third Party Auditor (TPA).

Challenges for ensuring data integrity in Cloud Traditional crypto primitives can not be directly adopted. No local copy of data at user side. Retrieving large amount data for checking is unpractical. I/O burden on both servers and user, Huge network traffic, Expensive services charge, by byte of I/O and byte transferred Data dynamics should be considered Cloud is not just a data warehouse: data may be frequently updated. Most previous work on remote data integrity do not support data dynamics Distributed protocols for storage correctness is demanded Cloud is powered by data centers running in a simultaneous, cooperated and distributed manner Most previous work on distributed data storage only provide binary results for the storage correctness.

Design Goals Storage Correctness Verification Distributed protocol for storage correctness assurance Fast Data Error Localization (outperform the binary result) Identifying misbehaving server(s) Explicit Dynamic Data Operation Support Data modification, deletion and append are considered Dependability Minimize the effect brought by data errors or server failures Efficiency

Outline Cloud Computing Background Data Storage Security in Cloud Computing Our Approach Ensuring Cloud Data Storage Supporting Data Dynamics Evaluation Concluding Remarks

Ensuring Cloud Data Storage F 1 F 2 F 3 G (1) G (2) G (3) G (4) G (5) f 11 f 21 f 31 f 41 f 51 f 12 f 22 f 32 f 42 f 52 f 13 f 23 f 33 f 43 f 53 f 11 f 21 f 31 f 41 f 51 f 12 f 22 f 32 f 42 f 52 f 13 f 23 f 33 f 43 f 53 f 14 f 24 f 34 f 44 f 54 f 15 f 25 f 35 f 45 f 55 A Reed-Solomon Codeword f 11 f 12 f 13...... f 53 Original file block Parity block We rely on a (m + k, k) Reed-Solomon erasure-correcting code to disperse the data file F redundantly across a set of n = m + k distributed servers. The systematic layout with parity vectors is achieved with the information dispersal matrix A: G F A F ( I P ) ( F, F F ) ( I P) 1 2 m (1) (2) ( ) ( 1) ( ) ( G G G m G m m,,, G k )

Ensuring Cloud Data Storage F 1 F 2 F 3 G (1) G (2) G (3) G (4) G (5) f 11 f 21 f 31 f 41 f 51 f 12 f 22 f 32 f 42 f 52 f 13 f 23 f 33 f 43 f 53 f 11 f 21 f 31 f 41 f 51 f 12 f 22 f 32 f 42 f 52 f 13 f 23 f 33 f 43 f 53 f 14 f 24 f 34 f 44 f 54 f 15 f 25 f 35 f 45 f 55 A Reed-Solomon Codeword f 11 f 12 f 13...... f 53 Original file block Parity block Based on the codeword relationship, we can verify the correctness of data block in each row via information dispersal matrix A (or P). ( f, f, f ) P ( f, f ) 31 32 33 34 35 Can we do better? Drawbacks: 1. need block retrieval at first, which is proportional to vector length. 2. large communication overhead. 3. only binary result about the storage state.

Ensuring Cloud Data Storage α α 2 α 3 G (1) G (2) G (3) G (4) G (5) f 11 f 21 f 31 f 41 f 51 f 12 f 22 f 32 f 42 f 52 f 13 f 23 f 33 f 43 f 53 f 14 f 24 f 34 f 44 f 54 f 15 f 25 f 35 f 45 f 55 R (1) R (2) R (3) R (4) R (5) v (1) v (2) v (3) v (4) v (5) Original file block Server Response Parity block Pre-computed token 1. Check if it is a valid a Reed-Solomon Codeword. If not, go to step 2. 2. Check if R (j) =v (j) (j = 1,,5 ) to identify the misbehaving server(s). Random sampling + homomorphic token pre-computation(linear combination) ( j) R 3 ( j) q ( j) v * G [ I ],{ I 1,3,5} and j {1,...,5} Advantages: 1. only small constant block retrieval is required 2. Finding misbehaving server(s) 3. Efficiency q 1 q q (1) (2) (3) (4) (5) ( R, R, R ) P ( R, R )

Outline Cloud Computing Background Data Storage Security in Cloud Computing Our Approach Ensuring Cloud Data Storage Supporting Data Dynamics Evaluation Concluding Remarks

Supporting Data Dynamics Cloud data storage is not only for archive purpose General block-level operations: update, delete, append Trivial way is to download all the data from the cloud servers and re-compute parity blocks and tokens Can we do better?

Supporting Data Dynamics Logical representation of data dynamics, including block update, append and delete F 1* F 2* F 3* f 11 f 12* f 13 f 21* f 22 f 23 f 31 f 32 f 33 f 41 f 42 f 43* f 51 f 52* f 53 f 61 f 62 f 63 = F 1 F 2 F 3 ΔF 1 ΔF 2 ΔF 3 f 11 f 12 f 13 0 Δf 12 0 f 21 f 22 f 23 Δf 21 0 0 f 31 f 32 f 33 + 0 0 0 f 41 f 42 f 43 0 0 Δf 43 f 51 f 52 f 53 0 Δf 52 0 0 0 0 f 61 f 62 f 63 Original file block Modified block Appended block * F A ( F F) A F A F A Due to the linear property of Reed-Solomon code, we can amend the parity blocks, without involving any of the unchanged blocks.

Supporting Data Dynamics Similarly: we can amend the tokens, without retrieving any of the unchanged blocks. r ( j) q ( j) v * G [ Iq],{ Iq [1,..., l] 1 q r} q 1 Suppose a block G (j) [I s ], which is covered by the specific token v (j), has been changed: G [ I ] G [ I ] G [ I ] ( j) ( j) ( j) s s s The token v (j) can be updated: ( j) ( j) s ( j v v G ) [ I ] s { q}. s

Outline Cloud Computing Background Data Storage Security in Cloud Computing Our Approach Ensuring Cloud Data Storage Supporting Data Dynamics Evaluation Concluding Remarks

Security Analysis Detection Probability: Assume the adversary modifies or deletes the data blocks in z rows out of the total l rows in the encoded file matrix. Each time we samples r rows to check, the detection probability will be: p d r 1 z l z 1 (1 min{,1}) 1 ( ) l i l i 0 r If z/l = 1% and r = 460, the detection probability P d is at least 99%.

Security Analysis Colluding Attack Resistance: Can we hide the secret encoding matrix P without affecting the validity of the checking results? Yes! Make use of the linear property of Erasure Correcting Coding. Adding random perturbations to the encoded file matrix and hence hide the secret matrix P. The linear property of RS-code makes random perturbations easily stripped away for verification purposes.

Performance Evaluation File Pre-distribution Cost Set I m=4 m=6 m=8 m=10 k = 2 567.45s 484.55s 437.22s 414.22s Set II k=1 k=2 k=3 k=4 m=8 358.90s 437.22s 584.55s 733.34s The cost of parity generation in seconds for an 8GB data file on Intel Core 2 processor running at 1.86GHz. For set I, the number of parity servers k is fixed; for Set II, the number of data servers m is constant. Token Pre-computation Cost To verify the data once per day for the next 5 years, the average token pre-computation cost according to our implementation is 51.97s per data vector, given r = 460.

Outline Cloud Computing Background Data Storage Security in Cloud Computing Our Approach Ensuring Cloud Data Storage Supporting Data Dynamics Evaluation Concluding Remarks

Concluding Remarks 1) Instead of giving only binary results about the storage state across the distributed servers, our work further provides the localization of data error. 2) In addition to ensuring cloud data integrity, the new scheme supports secure and efficient dynamic operations on data blocks, including: update, delete and append. 3) Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient under various untrusted server scenarios.

Thank You!