On security of data storage in cloud computing via exact regenerating code

Cloud storage provides service to the user for storing and maintaining their data. The users can access their data from anywhere, independent of location and provides less storage and maintenance cost. As the cloud is unreliable so this data storage service introduces security challenges, such as Confidentiality, Integrity, Availability and Reliability of data. In this paper we propose a new approach which is based on EEMSR (Explicit Exact Minimal Storage Regenerating Code) with hash function which provides Reliability, Availability as well as Integrity. An EMSR code which is a Regenerating code, can exactly regenerate back a lost block with less repair traffic. An EMSR code is defined by the parameters (n, k, d) that permits data recovery from any k of n nodes, and also have the capability of repairing a failed node by connecting to any d nodes. We used hash function with EMSR to achieve Integrity of the data stored in cloud through Challenge-Response protocol.

[1]  Ernst W. Biersack,et al.  Hierarchical codes: A flexible trade-off for erasure codes in peer-to-peer storage systems , 2010, Peer Peer Netw. Appl..

[2]  Ethan L. Miller,et al.  Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[3]  Patrick P. C. Lee,et al.  Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage , 2012, SRDS.

[4]  Yang Tang,et al.  NCCloud: applying network coding for the storage repair in a cloud-of-clouds , 2012, FAST.

[5]  R. Subramanian,et al.  A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing , 2012, Int. J. Cloud Appl. Comput..

[6]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[7]  Nihar B. Shah,et al.  Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction , 2010, IEEE Transactions on Information Theory.

[8]  Patrick P. C. Lee,et al.  Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation , 2014, IEEE Transactions on Parallel and Distributed Systems.

[9]  P SyamKumar,et al.  An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing , 2011 .

[10]  Syam Kumar,et al.  An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing , 2011 .

[11]  Melek Önen,et al.  A Security Protocol for Self-Organizing Data Storage , 2008, SEC.

[12]  Alexandros G. Dimakis,et al.  Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[13]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[14]  Kannan Ramchandran,et al.  Explicit construction of optimal exact regenerating codes for distributed storage , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[15]  F. Moore,et al.  Polynomial Codes Over Certain Finite Fields , 2017 .

[16]  Reza Curtmola,et al.  MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[17]  Reza Curtmola,et al.  Remote data checking using provable data possession , 2011, TSEC.