DocumentCode :
588883
Title :
The Design Principles for User-centered Remote Data Possession Checking
Author :
Lanxiang Chen ; Zhen Peng
Author_Institution :
Key Lab. of Network Security & Cryptology, Fujian Normal Univ., Fuzhou, China
fYear :
2012
fDate :
17-18 Nov. 2012
Firstpage :
615
Lastpage :
618
Abstract :
As cloud computing can achieve the goal that getting all information resources in a plug-and-play way, it is rising recently. Data Storage as a Service (DaSaaS) is a typical application of cloud computing. It provides data storage services for users. Because of security and reliability, DaSaaS is not widely adopted. When users store their data in the DaSaaS server, they mostly concern about whether the data is intact, whether it can be recovered when there is a failure. This is the goal of remote data possession checking (RDPC) schemes. This paper exploits the design principles for user-centered RDPC schemes. Firstly an overview of RDPC is presented. Then the requirements of users are discussed. According to these requirements, the design principle is presented and a formula to trade off RDPC schemes is provided. They will help designers to design more effective schemes.
Keywords :
cloud computing; formal verification; DaSaaS; RDPC; cloud computing; data storage as a service; design principles; information resources; user centered remote data possession checking; Bandwidth; Cloud computing; Cryptography; Memory; Servers; Silicon; Remote data possession checking; proof of retrievability; provable data possession; storage reliability; storage security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Security (CIS), 2012 Eighth International Conference on
Conference_Location :
Guangzhou
Print_ISBN :
978-1-4673-4725-9
Type :
conf
DOI :
10.1109/CIS.2012.143
Filename :
6405914
Link To Document :
بازگشت