Title :
The Design Principles for User-centered Remote Data Possession Checking
Author :
Lanxiang Chen ; Zhen Peng
Author_Institution :
Key Lab. of Network Security & Cryptology, Fujian Normal Univ., Fuzhou, China
Abstract :
As cloud computing can achieve the goal that getting all information resources in a plug-and-play way, it is rising recently. Data Storage as a Service (DaSaaS) is a typical application of cloud computing. It provides data storage services for users. Because of security and reliability, DaSaaS is not widely adopted. When users store their data in the DaSaaS server, they mostly concern about whether the data is intact, whether it can be recovered when there is a failure. This is the goal of remote data possession checking (RDPC) schemes. This paper exploits the design principles for user-centered RDPC schemes. Firstly an overview of RDPC is presented. Then the requirements of users are discussed. According to these requirements, the design principle is presented and a formula to trade off RDPC schemes is provided. They will help designers to design more effective schemes.
Keywords :
cloud computing; formal verification; DaSaaS; RDPC; cloud computing; data storage as a service; design principles; information resources; user centered remote data possession checking; Bandwidth; Cloud computing; Cryptography; Memory; Servers; Silicon; Remote data possession checking; proof of retrievability; provable data possession; storage reliability; storage security;
Conference_Titel :
Computational Intelligence and Security (CIS), 2012 Eighth International Conference on
Conference_Location :
Guangzhou
Print_ISBN :
978-1-4673-4725-9
DOI :
10.1109/CIS.2012.143