Information Dispersion over Redundant Arrays of Optimal Cloud Storage for Desktop Users

Data storage in cloud computing centres is gaining popularity for personal and institutional data backups as well as for highly scalable access from software applications running on attached compute servers. The data is usually access-protected, encrypted and replicated depending on the security and scalability needs. Despite the advances in technology, the practical usefulness and longevity of so-called cloud storage is limited in today's systems which severely impacts the acceptance and adoption rates. Therefore, we introduce a novel cloud storage management architecture which combines storage resources from multiple providers so that redundancy, security and other non-functional properties can be adjusted adequately to the needs of the user. Furthermore, we present NubiSave, a user-friendly implementation with configurable adequate overhead which runs on and integrates into contemporary desktop systems. Finally, a brief analysis of measurements performed by us shows how well the system performs in a real distributed cloud storage environment.

[1]  Peter Deutsch,et al.  DEFLATE Compressed Data Format Specification version 1.3 , 1996, RFC.

[2]  Ronny Seiger,et al.  SecCSIE: A Secure Cloud Storage Integrator for Enterprises , 2011, 2011 IEEE 13th Conference on Commerce and Enterprise Computing.

[3]  Raymond P. Fisk,et al.  A Customer Liberation Manifesto , 2009 .

[4]  James S. Plank The RAID-6 Liberation Codes , 2008, FAST.

[5]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[6]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[7]  Lihao Xu,et al.  Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[8]  Axel Polleres,et al.  Towards Intelligent web Services: Web Service Modeling Ontology (WSMO) , 2005 .

[9]  Ajith Abraham,et al.  Enhancing Web Service Selection by User Preferences of Non-functional Features , 2008, 2008 4th International Conference on Next Generation Web Services Practices.

[10]  Iris Braun,et al.  ConQo – A Context- And QoS-Aware Service Discovery , 2008 .

[11]  Siani Pearson,et al.  Enhancing privacy in cloud computing via policy-based obfuscation , 2012, The Journal of Supercomputing.

[12]  Konrad Voigt,et al.  A Service Description Language for the Internet of Services , 2009 .

[13]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[14]  Remzi Seker,et al.  JigDFS: A secure distributed file system , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.

[15]  Randy H. Katz,et al.  A case for redundant arrays of inexpensive disks (RAID) , 1988, SIGMOD '88.

[16]  Josef Spillner,et al.  Contract Services for Post-discovery Guarantee Management , 2009, ICSOFT.

[17]  Peter A. Dinda,et al.  Wayback: A User-level Versioning File System for Linux (Awarded Best Paper!) , 2004, USENIX Annual Technical Conference, FREENIX Track.