TIMER: Secure and reliable cloud storage against data re-outsourcing

Tao Jiang, Xiaofeng Chen, Jin Li, Duncan Shek Wong, Jianfeng Ma, Joseph K Liu

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

17 Citations (Scopus)

Abstract

The semi-trusted servers in cloud environment may outsource the files of their clients to some low expensive servers to increase their profit. To some extent, such behavior may violate the wishes of cloud users and impair their legitimate rights and interests. In this paper, a probabilistic challenge-response scheme is proposed to prove that the clients files are available and stored in a specified cloud server. In order to resist the collusion of cloud servers, common cloud infrastructure with some reasonable limits, such as rational economic security model, semi-collusion security model and response time bound, are exploited. These limits guarantee that a malicious cloud server could not conduct a t-round communication in a finite time. We analyze the security and performance of the proposed scheme and demonstrate that our scheme provides strong incentives for economically rational cloud providers against re-outsourcing the clients data to some other cloud providers.
Original languageEnglish
Title of host publicationProceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014)
EditorsXinyi Huang, Jianying Zhou
Place of PublicationHeidelberg Germany
PublisherSpringer
Pages346 - 358
Number of pages13
Volume8434
ISBN (Print)9783319063195
DOIs
Publication statusPublished - 2014
Externally publishedYes
EventInformation Security Practice and Experience Conference 2014 - Fuzhou, China
Duration: 5 May 20148 May 2014
Conference number: 10th
https://link.springer.com/book/10.1007/978-3-319-06320-1

Conference

ConferenceInformation Security Practice and Experience Conference 2014
Abbreviated titleISPEC 2014
CountryChina
CityFuzhou
Period5/05/148/05/14
Internet address

Cite this