A TPA Based Efficient Non-Repudiation Scheme for Cloud Storage

Article Preview

Abstract:

One of differences between cloud storage and previous storage is that there is a financial contract between user and the cloud service provider (CSP). User pay for service in exchange for certain guarantees and the cloud is a liable entity. But some mechanisms need to ensure the liability of CSP. Some work use non-repudiation to realize it. Compared with these non-repudiation schemes, we use third party auditor not client to manage proofs and some metadata, which are security critical data in cloud security. It can provide a more security environment for these data. Against the big overhead in update process of current non-repudiation scheme, we propose three schemes to improve it.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 765-767)

Pages:

1630-1635

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] J. Feng, Y. Chen, and Summerville, D.H. A Fair Multi-party Non-repudiation Scheme for Storage Clouds. Collaboration Technologies and Systems (CTS), (2011).

DOI: 10.1109/cts.2011.5928724

Google Scholar

[2] R. Popa, J. Lorch, D. Molnar, H. Wang, and L. Zhuang. Enabling Security in Cloud Storage SLAs with CloudProof. Microsoft Tech Report MSR-TR-2010-46, May, (2010).

Google Scholar

[3] S. Kamara and K. Lauter. Cryptographic Cloud Storage. Financial Cryptography and Data Security Lecture Notes in Computer Science Volume 6054, 2010, pp.136-149.

DOI: 10.1007/978-3-642-14992-4_13

Google Scholar

[4] A. Bessani, M. Correia, B. Quaresma, F. André, P. Sousa, L. Portugal. DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds. Proceeding EuroSys '11 Proceedings of the sixth conference on Computer systems Pages 31-46.

DOI: 10.1145/1966445.1966449

Google Scholar

[5] M. AlZain, E. Pardede, B. Soh, and J. Thom. Cloud computing security: from single to multi-clouds. the 45 th Hawaii International Conference on System Sciences, Hawaii, United States, (2012).

DOI: 10.1109/hicss.2012.153

Google Scholar

[6] Bugiel, S., Nurnberger, S., Sadeghi, A.R., Schneide, T. Twin Clouds: An Architecture for Secure Cloud Computing. In: Workshop on Cryptography and Security in Clouds, Zurich, March 15-16 (2011).

Google Scholar

[7] Bowers, K.D., Juels, A., Oprea, A. Hail: A high-availability and integrity layer for cloud storage. Cryptology ePrint Archive, Report 2008/489 (2008).

DOI: 10.1145/1653662.1653686

Google Scholar

[8] A. Juels and Burton S. Kaliski. PORs: Proofs of Retrievability for Large Files. CCS '07 Proceedings of the 14th ACM conference on Computer and communications security Pages 584-597.

DOI: 10.1145/1315245.1315317

Google Scholar

[9] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. CCS '07 Proceedings of the 14th ACM conference on Computer and communications security Pages 598-609.

DOI: 10.1145/1315245.1315318

Google Scholar

[10] H. Shacham, B. Waters. Compact Proofs of Retrievability. Advances in Cryptology - ASIACRYPT 2008 Lecture Notes in Computer Science Volume 5350, 2008, pp.90-107.

DOI: 10.1007/978-3-540-89255-7_7

Google Scholar

[11] Ari Juels, Burton S. Kaliski Jr. PORs: Proofs of retrievability for large files. In: ACM conference on computer and communications security.

DOI: 10.1145/1315245.1315317

Google Scholar

[12] C. Wang, Q. Wang, and Kui Ren. Ensuring Data Storage Security in Cloud Computing. Quality of Service, 2009. IWQoS. 17th International.

DOI: 10.1109/iwqos.2009.5201385

Google Scholar