Skip to main content

2019 | OriginalPaper | Buchkapitel

Practical Verification of Data Encryption for Cloud Storage Services

verfasst von : Jinxia Fang, Limin Liu, Jingqiang Lin

Erschienen in: Services Computing – SCC 2019

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Sensitive data is usually encrypted to protect against data leakage and unauthorized access for cloud storage services. Generally, the remote user has no knowledge of the actual data format stored in the cloud, even though a cloud server promises to store the data with encryption. Although a few works utilize data encapsulation and remote data checking to detect whether the sensitive data is protected securely in the cloud, they still suffer from a number of limitations, such as heavy computational cost at the user side and poor practicality, that would hinder their adoptions. In this paper, we propose a practical verification scheme to allow users to remotely evaluate the actually deployed data encryption protection in the cloud. We employ the pseudo-random number generator and present a data encapsulation solution, which can benefit users with significant cost savings. By imposing monetary rewards or penalties, our proposed scheme can help ensure that the cloud server stores data encrypted at rest honestly. Extensive experiments are conducted to further demonstrate the efficiency and practicality of the proposed scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Suppose that the size of \(G_i\) is a multiple of \(l_{k}\). If not, we may add some padding to the last piece.
 
2
Because \(G_{i,j}\) has \(l_k\) bits, \(0 \le G_{i,j} \le 2^{l_k}-1\).
 
Literatur
7.
Zurück zum Zitat Armknecht, F., Barman, L., Bohli, J.M., et al.: Mirror: enabling proofs of data replication and retrievability in the cloud. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 1051–1068. USENIX Association, Austin (2016) Armknecht, F., Barman, L., Bohli, J.M., et al.: Mirror: enabling proofs of data replication and retrievability in the cloud. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 1051–1068. USENIX Association, Austin (2016)
8.
Zurück zum Zitat Armknecht, F., Bohli, J.M., Froelicher, D., et al.: Sport: Sharing proofs of retrievability across tenants. Cryptology ePrint Archive, Report 2016/724 (2016) Armknecht, F., Bohli, J.M., Froelicher, D., et al.: Sport: Sharing proofs of retrievability across tenants. Cryptology ePrint Archive, Report 2016/724 (2016)
9.
Zurück zum Zitat Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609 (2007) Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609 (2007)
10.
Zurück zum Zitat Benson, K., Dowsley, R., Shacham, H.: Do you know where your cloud files are? In: ACM Cloud Computing Security Workshop, Ccsw 2011, Chicago, IL, USA, pp. 73–82, October 2011 Benson, K., Dowsley, R., Shacham, H.: Do you know where your cloud files are? In: ACM Cloud Computing Security Workshop, Ccsw 2011, Chicago, IL, USA, pp. 73–82, October 2011
11.
Zurück zum Zitat Bowers, K.D., Dijk, M.V., Juels, A., et al.: How to tell if your cloud files are vulnerable to drive crashes. In: ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, pp. 501–514, October 2011 Bowers, K.D., Dijk, M.V., Juels, A., et al.: How to tell if your cloud files are vulnerable to drive crashes. In: ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, pp. 501–514, October 2011
12.
Zurück zum Zitat van Dijk, M., Juels, A., Oprea, A., et al.: Hourglass schemes: how to prove that cloud files are encrypted, pp. 265–280 (2012) van Dijk, M., Juels, A., Oprea, A., et al.: Hourglass schemes: how to prove that cloud files are encrypted, pp. 265–280 (2012)
13.
Zurück zum Zitat Fu, A., Yu, S., Zhang, Y., et al.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans. Big Data 1 (2017) Fu, A., Yu, S., Zhang, Y., et al.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans. Big Data 1 (2017)
14.
Zurück zum Zitat Gorke, C.A., Janson, C., Armknecht, F., et al.: Cloud storage file recoverability. In: ACM International Workshop on Security in Cloud Computing (2017) Gorke, C.A., Janson, C., Armknecht, F., et al.: Cloud storage file recoverability. In: ACM International Workshop on Security in Cloud Computing (2017)
15.
Zurück zum Zitat Hu, K., Zhang, W.: Efficient verification of data encryption on cloud servers. In: Twelfth International Conference on Privacy, Security and Trust, pp. 314–321 (2014) Hu, K., Zhang, W.: Efficient verification of data encryption on cloud servers. In: Twelfth International Conference on Privacy, Security and Trust, pp. 314–321 (2014)
16.
Zurück zum Zitat Hur, J., Koo, D., Shin, Y., et al.: Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans. Knowl. Data Eng. 28(11), 3113–3125 (2016)CrossRef Hur, J., Koo, D., Shin, Y., et al.: Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans. Knowl. Data Eng. 28(11), 3113–3125 (2016)CrossRef
17.
Zurück zum Zitat Juels, A.: PORs: proofs of retrievability for large files. In: ACM Conference on Computer and Communications Security, pp. 584–597 (2007) Juels, A.: PORs: proofs of retrievability for large files. In: ACM Conference on Computer and Communications Security, pp. 584–597 (2007)
18.
Zurück zum Zitat Li, D., Chen, J., Guo, C., et al.: IP-geolocation mapping for moderately connected internet regions. IEEE Trans. Parallel Distrib. Syst. 24(2), 381–391 (2013)MathSciNetCrossRef Li, D., Chen, J., Guo, C., et al.: IP-geolocation mapping for moderately connected internet regions. IEEE Trans. Parallel Distrib. Syst. 24(2), 381–391 (2013)MathSciNetCrossRef
19.
Zurück zum Zitat Li, J., Li, J., Xie, D., et al.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8), 2386–2396 (2016)MathSciNetCrossRef Li, J., Li, J., Xie, D., et al.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8), 2386–2396 (2016)MathSciNetCrossRef
20.
Zurück zum Zitat Long, M., Li, Y., Peng, F.: Dynamic provable data possession of multiple copies in cloud storage based on full-node of AVL tree. Int. J. Digit. Crime Forensics 11(1), 126–137 (2019)CrossRef Long, M., Li, Y., Peng, F.: Dynamic provable data possession of multiple copies in cloud storage based on full-node of AVL tree. Int. J. Digit. Crime Forensics 11(1), 126–137 (2019)CrossRef
21.
Zurück zum Zitat Shen, W., Qin, J., Yu, J., et al.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331–346 (2019)CrossRef Shen, W., Qin, J., Yu, J., et al.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331–346 (2019)CrossRef
22.
Zurück zum Zitat Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015)CrossRef Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015)CrossRef
23.
Zurück zum Zitat Wang, Q., Ren, K., Lou, W., et al.: Dependable and secure sensor data storage with dynamic integrity assurance. In: INFOCOM, pp. 954–962 (2009) Wang, Q., Ren, K., Lou, W., et al.: Dependable and secure sensor data storage with dynamic integrity assurance. In: INFOCOM, pp. 954–962 (2009)
24.
Zurück zum Zitat Wang, Q., Wang, C., Ren, K., et al.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef Wang, Q., Wang, C., Ren, K., et al.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef
25.
Zurück zum Zitat Wang, Z., Sun, K., Jing, J., et al.: Verification of data redundancy in cloud storage. In: Proceedings of the 2013 international workshop on Security in cloud computing, pp. 11–18 (2013) Wang, Z., Sun, K., Jing, J., et al.: Verification of data redundancy in cloud storage. In: Proceedings of the 2013 international workshop on Security in cloud computing, pp. 11–18 (2013)
26.
Zurück zum Zitat Wu, Y., Jiang, Z.L., Wang, X., et al.: Dynamic data operations with deduplication in privacy-preserving public auditing for secure cloud storage. In: IEEE International Conference on Computational Science and Engineering, pp. 562–567 (2017) Wu, Y., Jiang, Z.L., Wang, X., et al.: Dynamic data operations with deduplication in privacy-preserving public auditing for secure cloud storage. In: IEEE International Conference on Computational Science and Engineering, pp. 562–567 (2017)
27.
Zurück zum Zitat Yang, G., Yu, J., Shen, W., et al.: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, 130–139 (2016)CrossRef Yang, G., Yu, J., Shen, W., et al.: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, 130–139 (2016)CrossRef
Metadaten
Titel
Practical Verification of Data Encryption for Cloud Storage Services
verfasst von
Jinxia Fang
Limin Liu
Jingqiang Lin
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-23554-3_2

Premium Partner