14
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Secure Cloud Storage with Data Dynamics and Privacy-Preserving Audits Using Secure Network Coding

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In the age of cloud computing, cloud users with a limited amount of storage can outsource their data to remote servers. The cloud servers, in lieu of monetary benefits, offer retrievability of their clients' data at any point of time. Secure cloud storage protocols ensure the integrity of the outsourced data that can be dynamic (or static) in nature depending on whether the client can (or cannot) update the uploaded data as needed. In this work, we explore the possibility of constructing a secure cloud storage for dynamic data by leveraging the idea of secure network coding. Specifically, we fail to provide a general construction of an efficient secure cloud storage protocol for dynamic data from an arbitrary secure network coding protocol. However, we show that some of the secure network coding schemes with some required properties can be used to construct secure cloud storage protocols for dynamic data, and we indeed construct a publicly verifiable secure cloud storage protocol based on a secure network coding protocol. In a publicly verifiable setting, it is desirable that a third party auditor gains no knowledge about the actual content of the client's data which may be sensitive. We extend our scheme in order to provide privacy-preserving audits. Furthermore, we extend our scheme in order to offer anonymity of a user updating shared data in an enterprise setting. We also modify an existing secure cloud storage protocol for dynamic data in order to support privacy-preserving audits. We compare the performance of our secure cloud storage protocol with that of other secure cloud storage schemes. Finally, we provide another construction of a secure cloud storage protocol that is specialized for append-only data and that overcomes some of the limitations of our earlier scheme.

          Related collections

          Most cited references22

          • Record: found
          • Abstract: not found
          • Article: not found

          Network information flow

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Polynomial Codes Over Certain Finite Fields

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Provable data possession at untrusted stores

                Bookmark

                Author and article information

                Journal
                2016-12-23
                Article
                1612.08029
                70887fc1-8000-4ef4-ad76-90aee46ea51e

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                cs.CR

                Security & Cryptology
                Security & Cryptology

                Comments

                Comment on this article