TIMER: Secure and reliable cloud storage against data re-outsourcing

Tao Jiang, Xiaofeng Chen, Jin Li, Duncan Shek Wong, Jianfeng Ma, Joseph K Liu

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

Abstract

The semi-trusted servers in cloud environment may outsource the files of their clients to some low expensive servers to increase their profit. To some extent, such behavior may violate the wishes of cloud users and impair their legitimate rights and interests. In this paper, a probabilistic challenge-response scheme is proposed to prove that the clients files are available and stored in a specified cloud server. In order to resist the collusion of cloud servers, common cloud infrastructure with some reasonable limits, such as rational economic security model, semi-collusion security model and response time bound, are exploited. These limits guarantee that a malicious cloud server could not conduct a t-round communication in a finite time. We analyze the security and performance of the proposed scheme and demonstrate that our scheme provides strong incentives for economically rational cloud providers against re-outsourcing the clients data to some other cloud providers.
Original languageEnglish
Title of host publicationProceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014)
EditorsXinyi Huang, Jianying Zhou
Place of PublicationHeidelberg Germany
PublisherSpringer
Pages346 - 358
Number of pages13
Volume8434
ISBN (Print)9783319063195
DOIs
Publication statusPublished - 2014
Externally publishedYes
EventInformation Security Practice and Experience Conference 2014 - Fuzhou, China
Duration: 5 May 20148 May 2014
Conference number: 10th
https://link.springer.com/book/10.1007/978-3-319-06320-1

Conference

ConferenceInformation Security Practice and Experience Conference 2014
Abbreviated titleISPEC 2014
CountryChina
CityFuzhou
Period5/05/148/05/14
Internet address

Cite this

Jiang, T., Chen, X., Li, J., Wong, D. S., Ma, J., & Liu, J. K. (2014). TIMER: Secure and reliable cloud storage against data re-outsourcing. In X. Huang, & J. Zhou (Eds.), Proceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014) (Vol. 8434, pp. 346 - 358). Heidelberg Germany: Springer. https://doi.org/10.1007/978-3-319-06320-1_26
Jiang, Tao ; Chen, Xiaofeng ; Li, Jin ; Wong, Duncan Shek ; Ma, Jianfeng ; Liu, Joseph K. / TIMER: Secure and reliable cloud storage against data re-outsourcing. Proceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014). editor / Xinyi Huang ; Jianying Zhou. Vol. 8434 Heidelberg Germany : Springer, 2014. pp. 346 - 358
@inproceedings{f81963ce23f947a3b59ae57843787fe4,
title = "TIMER: Secure and reliable cloud storage against data re-outsourcing",
abstract = "The semi-trusted servers in cloud environment may outsource the files of their clients to some low expensive servers to increase their profit. To some extent, such behavior may violate the wishes of cloud users and impair their legitimate rights and interests. In this paper, a probabilistic challenge-response scheme is proposed to prove that the clients files are available and stored in a specified cloud server. In order to resist the collusion of cloud servers, common cloud infrastructure with some reasonable limits, such as rational economic security model, semi-collusion security model and response time bound, are exploited. These limits guarantee that a malicious cloud server could not conduct a t-round communication in a finite time. We analyze the security and performance of the proposed scheme and demonstrate that our scheme provides strong incentives for economically rational cloud providers against re-outsourcing the clients data to some other cloud providers.",
author = "Tao Jiang and Xiaofeng Chen and Jin Li and Wong, {Duncan Shek} and Jianfeng Ma and Liu, {Joseph K}",
year = "2014",
doi = "10.1007/978-3-319-06320-1_26",
language = "English",
isbn = "9783319063195",
volume = "8434",
pages = "346 -- 358",
editor = "Xinyi Huang and Jianying Zhou",
booktitle = "Proceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014)",
publisher = "Springer",

}

Jiang, T, Chen, X, Li, J, Wong, DS, Ma, J & Liu, JK 2014, TIMER: Secure and reliable cloud storage against data re-outsourcing. in X Huang & J Zhou (eds), Proceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014). vol. 8434, Springer, Heidelberg Germany, pp. 346 - 358, Information Security Practice and Experience Conference 2014, Fuzhou, China, 5/05/14. https://doi.org/10.1007/978-3-319-06320-1_26

TIMER: Secure and reliable cloud storage against data re-outsourcing. / Jiang, Tao; Chen, Xiaofeng; Li, Jin; Wong, Duncan Shek; Ma, Jianfeng; Liu, Joseph K.

Proceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014). ed. / Xinyi Huang; Jianying Zhou. Vol. 8434 Heidelberg Germany : Springer, 2014. p. 346 - 358.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

TY - GEN

T1 - TIMER: Secure and reliable cloud storage against data re-outsourcing

AU - Jiang, Tao

AU - Chen, Xiaofeng

AU - Li, Jin

AU - Wong, Duncan Shek

AU - Ma, Jianfeng

AU - Liu, Joseph K

PY - 2014

Y1 - 2014

N2 - The semi-trusted servers in cloud environment may outsource the files of their clients to some low expensive servers to increase their profit. To some extent, such behavior may violate the wishes of cloud users and impair their legitimate rights and interests. In this paper, a probabilistic challenge-response scheme is proposed to prove that the clients files are available and stored in a specified cloud server. In order to resist the collusion of cloud servers, common cloud infrastructure with some reasonable limits, such as rational economic security model, semi-collusion security model and response time bound, are exploited. These limits guarantee that a malicious cloud server could not conduct a t-round communication in a finite time. We analyze the security and performance of the proposed scheme and demonstrate that our scheme provides strong incentives for economically rational cloud providers against re-outsourcing the clients data to some other cloud providers.

AB - The semi-trusted servers in cloud environment may outsource the files of their clients to some low expensive servers to increase their profit. To some extent, such behavior may violate the wishes of cloud users and impair their legitimate rights and interests. In this paper, a probabilistic challenge-response scheme is proposed to prove that the clients files are available and stored in a specified cloud server. In order to resist the collusion of cloud servers, common cloud infrastructure with some reasonable limits, such as rational economic security model, semi-collusion security model and response time bound, are exploited. These limits guarantee that a malicious cloud server could not conduct a t-round communication in a finite time. We analyze the security and performance of the proposed scheme and demonstrate that our scheme provides strong incentives for economically rational cloud providers against re-outsourcing the clients data to some other cloud providers.

UR - http://goo.gl/wQ4Vx4

U2 - 10.1007/978-3-319-06320-1_26

DO - 10.1007/978-3-319-06320-1_26

M3 - Conference Paper

SN - 9783319063195

VL - 8434

SP - 346

EP - 358

BT - Proceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014)

A2 - Huang, Xinyi

A2 - Zhou, Jianying

PB - Springer

CY - Heidelberg Germany

ER -

Jiang T, Chen X, Li J, Wong DS, Ma J, Liu JK. TIMER: Secure and reliable cloud storage against data re-outsourcing. In Huang X, Zhou J, editors, Proceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014). Vol. 8434. Heidelberg Germany: Springer. 2014. p. 346 - 358 https://doi.org/10.1007/978-3-319-06320-1_26