Rating cloud storage service by collaborative remote data checking

Cloud storage is a flexible platform for data outsourcing service. In such schemes, users no longer have the physical control of their data. As a result, the reliability of the cloud storage service is the major concern of users. Existing approaches evaluate the cloud storage provider CSP from users' feedback, which are subjective and often biased. In this paper, we propose a new rating algorithm to assess the credibility of CSPs. Our solution is based on technical evidence, e.g., results of the data possession checking, which is a useful approach to ensure the integrity and availability of outsourced data in the cloud. Our approach aggregates the collaborative provable data possession results from the community of clients to achieve high coverage. Meanwhile, we introduce a new reputation-based solution to detect malicious clients based on public verification, and adjust the trust value of such clients. We prototyped our approach and analysed the scheme thoroughly. The results demonstrated that the proposed method is efficient, secure, and has the distinguishing property that supports collaborative verification among composite cloud storage frameworks.

[1]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.

[2]  Shucheng Yu,et al.  Proofs of retrievability with public verifiability and constant communication cost in cloud , 2013, Cloud Computing '13.

[3]  Wei Ren,et al.  A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash function , 2014, Int. J. Comput. Sci. Eng..

[4]  Anne H. H. Ngu,et al.  Cloud Armor: a platform for credibility-based trust management of cloud services , 2013, CIKM.

[5]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[6]  Khaled M. Khan,et al.  Establishing Trust in Cloud Computing , 2010, IT Professional.

[7]  Tomoya Enokido,et al.  Trustworthiness of Acquaintances in Peer-to-Peer(P2P) Overlay Networks , 2009, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.

[8]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[9]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[10]  Farookh Khadeer Hussain,et al.  A hybrid approach for the personalisation of cloud-based e-governance services , 2013, Int. J. High Perform. Comput. Netw..

[11]  Tharam S. Dillon,et al.  SLA-Based Trust Model for Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.

[12]  Huajun Chen,et al.  Building trust in electronic communities by mining web content , 2010, Int. J. Comput. Sci. Eng..

[13]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[14]  Jia Xu,et al.  Towards efficient proofs of retrievability , 2012, ASIACCS '12.

[15]  Gang Yang,et al.  An Efficient Provable Data Possession Scheme with Data Dynamics , 2012, 2012 International Conference on Computer Science and Service System.

[16]  M. Phil,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .

[17]  Ying Li,et al.  A Trust Evaluation Mechanism for Collaboration of Data-Intensive Services in Cloud , 2013 .

[18]  Alptekin Küpçü,et al.  Transparent, Distributed, and Replicated Dynamic Provable Data Possession , 2013, ACNS.

[19]  Deyi Li,et al.  A New Subjective Trust Model Based on Cloud Model , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.

[20]  Massimo Ficco Security event correlation approach for cloud computing , 2013, Int. J. High Perform. Comput. Netw..

[21]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[22]  Shuai Wang,et al.  An Evaluation Approach of Subjective Trust Based on Cloud Model , 2008, CSSE.

[23]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[24]  Zhen Liu,et al.  Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage , 2014, ESORICS.

[25]  Feng Gao,et al.  Modelling the relationship between trust and privacy in network environments , 2014, Int. J. Comput. Sci. Eng..

[26]  Sherali Zeadally,et al.  Trust management of services in cloud environments: Obstacles and solutions , 2013, CSUR.

[27]  Quan Z. Sheng,et al.  Credibility-Based Trust Management for Services in Cloud Environments , 2011, ICSOC.

[28]  Yihua Zhang,et al.  Efficient dynamic provable possession of remote data via balanced update trees , 2013, ASIA CCS '13.

[29]  Ngoc Tram Anh Nguyen Fair and dynamic proofs of retrievability , 2014 .

[30]  Ning Han,et al.  A novel power-conscious scheduling algorithm for data-intensive precedence-constrained applications in cloud environments , 2014, Int. J. High Perform. Comput. Netw..