Cloud Storage Integrity Checking: Going from Theory to Practice

In the past decade, researchers have proposed various cloud storage integrity checking protocols to enable a cloud storage user to validate the integrity of the user's outsourced data. While the proposed solutions can in principle solve the cloud storage integrity checking problem, they are not sufficient for current cloud storage practices. In this position paper, we show the gaps between theoretical and practical cloud storage integrity checking solutions, through a categorization of existing solutions and an analysis of their underlying assumptions. To bridge the gap, we also call for practical cloud storage integrity checking solutions for three scenarios.

[1]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[2]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[3]  Tao Xiang,et al.  Secure cloud storage meets with secure network coding , 2016, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[4]  Elaine Shi,et al.  Practical dynamic proofs of retrievability , 2013, CCS.

[5]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[6]  Cong Wang,et al.  Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[7]  Mary Baker,et al.  Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..

[8]  Ghassan O. Karame,et al.  Outsourced Proofs of Retrievability , 2014, CCS.

[9]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[10]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[11]  Shucheng Yu,et al.  PCPOR: Public and constant-cost proofs of retrievability in cloud , 2015, J. Comput. Secur..

[12]  Zoe L. Jiang,et al.  Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.

[13]  Fatos Xhafa,et al.  OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices , 2015, IEEE Transactions on Cloud Computing.

[14]  Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security , 2014, CCS.

[15]  Refik Molva,et al.  StealthGuard: Proofs of Retrievability with Hidden Watchdogs , 2014, ESORICS.

[16]  Florian Kerschbaum,et al.  Symmetric-Key Based Proofs of Retrievability Supporting Public Verification , 2015, ESORICS.