Securing Resources in Decentralized Cloud Storage

Decentralized cloud storage services represent a promising opportunity for a different cloud market, meeting the supply and demand for IT resources of an extensive community of users. The dynamic and independent nature of the resulting infrastructure introduces security concerns that can represent a slowing factor toward the realization of such an opportunity, otherwise clearly appealing and promising for the expected economic benefits. In this paper, we present an approach enabling resource owners to effectively protect and securely delete their resources while relying on decentralized cloud services for their storage. Our solution combines All-Or-Nothing-Transform for strong resource protection, and carefully designed strategies for slicing resources and for their decentralized allocation in the storage network. We address both availability and security guarantees, jointly considering them in our model and enabling resource owners to control their setting.

[1]  Juan Benet,et al.  IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.

[2]  Jin Li,et al.  Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of-Clouds , 2014, HotCloud.

[3]  Mingqiang Li,et al.  CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal , 2015, IEEE Internet Computing.

[4]  Randy H. Katz,et al.  A case for redundant arrays of inexpensive disks (RAID) , 1988, SIGMOD '88.

[5]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[6]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[7]  James S. Plank,et al.  AONT-RS: Blending Security and Performance in Dispersed Storage Systems , 2011, FAST.

[8]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.

[9]  Miguel Correia,et al.  DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.

[10]  Issa Traore,et al.  Cloud Slicing a new architecture for cloud security monitoring , 2015, 2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM).

[11]  Shawn Wilkinson,et al.  Storj A Peer-to-Peer Cloud Storage Network , 2014 .

[12]  Sushil Jajodia,et al.  Dependable and Resilient Cloud Computing , 2016, 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE).

[13]  Siani Pearson,et al.  Privacy Risk, Security, Accountability in the Cloud , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[14]  Sabrina De Capitani di Vimercati,et al.  Mix&Slice: Efficient Access Revocation in the Cloud , 2016, CCS.

[15]  Javier López,et al.  Delegated Access for Hadoop Clusters in the Cloud , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.

[16]  Mauro Conti,et al.  A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.

[17]  Nick Lambert,et al.  The SAFE Network: a New, Decentralised Internet , 2014 .

[18]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[19]  James Irvine,et al.  Security of the MaidSafe Vault Network , 2014 .