SSDS-MC: Slice-based Secure Data Storage in Multi-Cloud Environment

With the easy access to cloud technologies and rich applications, more people tend to store their data in cloud. However, the data in the cloud have to face the privacy and security challenges. To enforce the privacy and security protection of data in the cloud, Slice-based Secure Data Storage in Multi-Cloud Environment (SSDS-MC) is proposed in this paper. Specifically, user data are divided into multiple slices, which are stored separately into different cloud. The advantages of SSDS-MC are two-fold: i) each cloud service provider does not have all the slices of the user data and thus cannot retrieve the full user data by the slice stored in his cloud, which can further protect the privacy and security of user data; ii) each slice can be duplicated and uploaded to multiple cloud, which improve the availability of data in case the slice gets lost or damaged in one place.

[1]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[2]  Raman Maini,et al.  COMPARISON OF DATA ENCRYPTION ALGORITHMS , 2011 .

[3]  Idit Keidar,et al.  Venus: verification for untrusted cloud storage , 2010, CCSW '10.

[4]  Miguel Correia,et al.  DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.

[5]  Min Chen,et al.  Cloud-based Wireless Network: Virtualized, Reconfigurable, Smart Wireless Network to Enable 5G Technologies , 2015, Mob. Networks Appl..

[6]  Yang Tang,et al.  FADE: Secure Overlay Cloud Storage with File Assured Deletion , 2010, SecureComm.

[7]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[8]  Sawan Kumar,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[9]  J. P. Raina,et al.  Comparative Analysis of AES and RC4 Algorithms for Better Utilization , 2011 .

[10]  Mihir Bellare,et al.  Optimal Asymmetric Encryption-How to Encrypt with RSA , 1995 .

[11]  Zhao Peng-yuan Analysis of critical technologies on cloud storage security , 2011 .

[12]  Mihir Bellare,et al.  A concrete security treatment of symmet-ric encryption: Analysis of the DES modes of operation , 1997, FOCS 1997.

[13]  Alysson Neves Bessani,et al.  DepSky: dependable and secure storage in a cloud-of-clouds , 2011, EuroSys '11.

[14]  Simson L. Garfinkel,et al.  An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS , 2007 .

[15]  Shusen Yang,et al.  A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.