Hy-SAIL: Hyper-Scalability, Availability and Integrity Layer for Cloud Storage Systems

Cloud storage has gained increasing attention from the industry and research communities with concerns about data stored in cloud computing environments, despite its many advantages. The reasons come from economic viability to the latency along with behavioral changes that may affect the applications that use data stored remotely. Among those challenges, there is the problem of ensuring the integrity and retrievability of users’ data in the cloud. Several schemas have been proposed: proof of data possession (PDP), proof of retrievability (PoR), and proof of ownership (PoW) that differ on the approach to guarantee the effective retrieval of data stored remotely. In this paper, a novel PoR protocol is proposed: hyper-scalability, availability, and integrity layer (Hy-SAIL), where a new PoR scheme adds higher availability to data stored and a flexible manner to perform integrity checks. It is demonstrated that Hy-SAIL leads to an efficient and scalable cryptographic system that meets near-optimal bounds in terms of communication and storage complexities. It is also proposed a new adversarial model that aggregates the main functionalities of a realistic adversary in cloud computing environments. Hy-SAIL operates on data that are not affected by any kind of incremental change or update, which is the characteristic of various file types stored in clouds, such as stored video and audio streams. When compared to other systems, such as HAIL, Hy-SAIL is more scalable and efficient. The results collected with an unoptimized implementation of Hy-SAIL point to a better perspective than other approaches.

[1]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[2]  P. Maymounkov Online codes , 2002 .

[3]  Benny Pinkas,et al.  Proofs of ownership in remote storage systems , 2011, CCS '11.

[4]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[5]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.

[6]  Douglas R. Stinson,et al.  Multi-prover proof of retrievability , 2016, IACR Cryptol. ePrint Arch..

[7]  Joong Bum Rhim,et al.  Fountain Codes , 2010 .

[8]  Roberto Tamassia,et al.  Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable) , 2015, CCS.

[9]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[10]  David Mazières,et al.  Rateless Codes and Big Downloads , 2003, IPTPS.

[11]  Tim Güneysu,et al.  Efficient Hardware Implementation of Finite Fields with Applications to Cryptography , 2006 .

[12]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[13]  Stephen S. Yau,et al.  Efficient provable data possession for hybrid clouds , 2010, CCS '10.

[14]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[15]  Hairong Kuang,et al.  The Hadoop Distributed File System , 2010, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST).

[16]  Yevgeniy Dodis,et al.  Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..

[17]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[18]  Alptekin Küpçü,et al.  Generic Efficient Dynamic Proofs of Retrievability , 2016, IACR Cryptol. ePrint Arch..

[19]  Stuart Hannabuss,et al.  The Big Switch: Rewiring the World, from Edison to Google , 2009 .

[20]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[21]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[22]  Roberto Tamassia,et al.  Falcon Codes: Fast, Authenticated LT Codes , 2014, IACR Cryptol. ePrint Arch..

[23]  Douglas R. Stinson,et al.  A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage , 2012, J. Math. Cryptol..

[24]  M. Phil,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .