Data Reliability and Redundancy Optimization of a Secure Multi-cloud Storage Under Uncertainty of Errors and Falsifications

Despite all the benefits a cloud data storages offer to customers, there is a high risk of breach of confidentiality, integrity, and availability related with the uncertainty of errors and falsifications, loss of information, denial of access for a long time, information leakage, conspiracy, and technical failures. In this article, we propose a configurable, reliable, and secure distributed data storage scheme with improved data redundancy, reliability, and encoding/decoding speed. Our system utilizes a Polynomial Residue Number System (PRNS) with a new method of error correction codes and secret sharing schemes. We introduce the concept of an approximate value of a rank (AR) of a polynomial. It reduces the computational complexity of the encoding/decoding and PRNS coefficients size. Based on the properties of the approximate value and PRNS, we introduce the AR-PRNS method for error detection, correction, and controlling computational results with capabilities of scalable parallel computing. We provide a theoretical basis to configure and optimize the redundancy of stored data and encoding/decoding speed to cope with different objective preferences, workloads, and storage properties. Theoretical analysis shows that, by appropriate selection of AR-PRNS parameters, the proposed scheme increases the safety, reliability, and reduces the overhead of data storage.

[1]  Nikolay I. Chervyakov,et al.  An efficient method of error correction in fault-tolerant modular neurocomputers , 2016, Neurocomputing.

[2]  Andrei Tchernykh,et al.  AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage , 2018, Int. J. Approx. Reason..

[3]  Nāgārjuna,et al.  A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding , 2014 .

[4]  Uwe Schwiegelshohn,et al.  Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability , 2016, J. Comput. Sci..

[5]  Patrick P. C. Lee,et al.  Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation , 2014, IEEE Transactions on Parallel and Distributed Systems.

[6]  Yunghsiang Sam Han,et al.  Novel Polynomial Basis and Its Application to Reed-Solomon Erasure Codes , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.

[7]  Kamesh Namuduri,et al.  HORNS: A homomorphic encryption scheme for Cloud Computing using Residue Number System , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[8]  Jian Liu,et al.  Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.

[9]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[10]  Çetin Kaya Koç,et al.  Parallel Multiplication in using Polynomial Residue Arithmetic , 2000, Des. Codes Cryptogr..

[11]  Arutyun Avetisyan,et al.  WA-RRNS: Reliable Data Storage System Based on Multi-cloud , 2018, 2018 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW).

[12]  Andrei Tchernykh,et al.  Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage , 2019, Cluster Computing.

[13]  Nikolay I. Chervyakov,et al.  AR-RRNS: Configurable reliable distributed data storage systems for Internet of Things to ensure security , 2017, Future Gener. Comput. Syst..

[14]  Xu Chen,et al.  The data protection of mapreduce using homomorphic encryption , 2013, 2013 IEEE 4th International Conference on Software Engineering and Service Science.

[15]  A. P. Shanthi,et al.  Towards the Design of a Secure and Fault Tolerant Cloud Storage in a Multi-Cloud Environment , 2015, Inf. Secur. J. A Glob. Perspect..

[16]  Liudmila Babenko,et al.  Known Plaintexts Attack on Polynomial based Homomorphic Encryption , 2014, SIN.

[17]  Maurice Mignotte,et al.  How to Share a Secret? , 1982, EUROCRYPT.

[18]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[19]  Craig Gentry,et al.  Computing arbitrary functions of encrypted data , 2010, CACM.

[20]  GhemawatSanjay,et al.  The Google file system , 2003 .

[21]  Mohammed Benaissa,et al.  Error detecting AES using polynomial residue number systems , 2013, Microprocess. Microsystems.

[22]  Antonio Puliafito,et al.  Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems , 2016, J. Netw. Comput. Appl..

[23]  Alexandros G. Dimakis,et al.  Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.