Auditing for Data Integrity and Reliability in Cloud Storage

Security has been identified as the most serious concern that prevents users from outsourcing sensitive data to the cloud. An efficient cloud auditing system will relieve users's concerns regarding the availability and integrity of their outsourced data by providing evidence and records to track the activities in the cloud. This chapter provides a complete view of cloud storage auditing systems from multiple perspectives, including a clear definition, applicable technologies, major challenges, current research status, and open questions. First of all, a systematical introduction to general design principles and focuses of information auditing is given from three different aspects: strategy oriented, process oriented, and resource oriented. Then, two useful technologies, Provable Data Possession (PDP) and Proof of Retrievability (POR), are discussed thoroughly, which have been developed to verify data integrity and availability in distributed storage systems. Several typical algorithms are analyzed to illustrate their design rationales and tradeoffs. Following that, the challenges in developing a cloud auditing system are discussed and current efforts in the cloud security community are introduced. Finally, several open questions are identified, which are expected to be addressed in the near future.

[1]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[2]  Jonathan Katz,et al.  Proofs of Storage from Homomorphic Identification Protocols , 2009, ASIACRYPT.

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Siani Pearson,et al.  Toward Accountability in the Cloud , 2011, IEEE Internet Computing.

[5]  Yu Chen,et al.  Bridging the Missing Link of Cloud Data Storage Security in AWS , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[6]  Yu Chen,et al.  A fair non-repudiation framework for data integrity in cloud storage services , 2013, Int. J. Cloud Comput..

[7]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[8]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[9]  Forbes Gibb,et al.  The information audit: Role and scope , 2007, Int. J. Inf. Manag..

[10]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[11]  Zhou Su,et al.  Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[12]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[13]  Yu Chen,et al.  A fair multi-party non-repudiation scheme for storage clouds , 2011, 2011 International Conference on Collaboration Technologies and Systems (CTS).

[14]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, ASIACRYPT.

[15]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[16]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[17]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[18]  D. Boneh,et al.  Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.