Title :
Secure cloud storage meets with secure network coding
Author :
Fei Chen ; Tao Xiang ; Yuanyuan Yang ; Chow, Sherman S. M.
Author_Institution :
Dept. of Comput. Sci. & Eng., Chinese Univ. of Hong Kong, Hong Kong, China
fDate :
April 27 2014-May 2 2014
Abstract :
This paper investigates the intrinsic relationship between secure cloud storage and secure network coding for the first time. Secure cloud storage was proposed only recently while secure network coding has been studied for more than ten years. We show in general how to construct a secure cloud storage protocol given any secure network coding protocol. Our construction suggests a systematic way to construct various secure cloud storage protocols. We also show that it is secure under a definition which captures the real world uses of the cloud storage. From our general construction, we propose a secure cloud storage protocol based on a recent secure network coding protocol. The protocol is the first publicly verifiable secure cloud storage protocol in the standard model, while the previous work is either not publicly verifiable, or security argument is only argued heuristically in the random oracle model. We also enhance the proposed protocol to support third-party public auditing, which has received considerable attention recently. Finally, we prototype the proposed protocol and evaluate its performance. Experimental results validate the effectiveness of the protocol.
Keywords :
cloud computing; network coding; security of data; general construction; intrinsic relationship; public auditing; random oracle model; secure cloud storage protocols; secure network coding protocol; Authentication; Cloud computing; Network coding; Routing protocols; Secure storage; Cloud storage auditing; network coding; security; third-party public auditing;
Conference_Titel :
INFOCOM, 2014 Proceedings IEEE
Conference_Location :
Toronto, ON
DOI :
10.1109/INFOCOM.2014.6847993