Reliable and Secure Distributed Cloud Data Storage Using Reed-Solomon Codes

Despite the popularity and many advantages of using cloud data storage, there are still major concerns about the data stored in the cloud, such as security, reliability and confidentiality. In this paper, we propose a reliable and secure distributed cloud data storage schema using Reed-Solomon codes. Different from existing approaches to achieving data reliability with redundancy at the server side, our proposed mechanism relies on multiple cloud service providers (CSP), and protects users’ cloud data from the client side. In our approach, we view multiple cloud-based storage services as virtual independent disks for storing redundant data encoded with erasure codes. Since each CSP has no access to a user’s complete data, the data stored in the cloud would not be easily compromised. Furthermore, the failure or disconnection of a CSP will not result in the loss of a user’s data as the missing data pieces can be readily recovered. To demonstrate the feasibility of our approach, we developed a prototype distributed cloud data storage application using three major CSPs. The experimental results show that, besides the reliability and security related benefits of our approach, the application outperforms each individual CSP for uploading and downloading files.

[1]  Erik Elmroth,et al.  A Cloud Environment for Data-intensive Storage Services , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[2]  Cheng Huang,et al.  Erasure Coding in Windows Azure Storage , 2012, USENIX Annual Technical Conference.

[3]  Neil J. A. Sloane,et al.  The theory of error-correcting codes (north-holland , 1977 .

[4]  James S. Plank,et al.  A tutorial on Reed–Solomon coding for fault‐tolerance in RAID‐like systems , 1997, Softw. Pract. Exp..

[5]  Franck Cappello,et al.  Scalable Reed-Solomon-Based Reliable Local Storage for HPC Applications on IaaS Clouds , 2012, Euro-Par.

[6]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[7]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[8]  Stephen B. Wicker,et al.  Reed-Solomon Codes and Their Applications , 1999 .

[9]  James S. Plank,et al.  Erasure Codes for Storage Systems: A Brief Primer , 2013, login Usenix Mag..

[10]  Haiping Xu,et al.  A RAID-Based Secure and Fault-Tolerant Model for Cloud Information Storage , 2013, Int. J. Softw. Eng. Knowl. Eng..

[11]  Anees Shaikh,et al.  Performance Isolation and Fairness for Multi-Tenant Cloud Storage , 2012, OSDI.

[12]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[13]  Ashraf Zia,et al.  Identifying Key Challenges in Performance Issues in Cloud Computing , 2012 .

[14]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[15]  Kai Hwang,et al.  Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.

[16]  Sriram Sankar,et al.  Server Engineering Insights for Large-Scale Online Services , 2010, IEEE Micro.

[17]  Haiping Xu,et al.  A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers , 2015, ICSE 2015.

[18]  Baochun Li,et al.  Erasure coding for cloud storage systems: A survey , 2013 .

[19]  Cheng Huang,et al.  Rethinking erasure codes for cloud file systems: minimizing I/O for recovery and degraded reads , 2012, FAST.

[20]  R. K. Bunkar,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2014 .