Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
column

Trusting the cloud

Published: 20 June 2009 Publication History

Abstract

More and more users store data in "clouds" that are accessed remotely over the Internet. We survey well-known cryptographic tools for providing integrity and consistency for data stored in clouds and discuss recent research in cryptography and distributed computing addressing these problems.

References

[1]
]]I. Abraham, G. Chockler, I. Keidar, and D. Malkhi. Byzantine disk Paxos: Optimal resilience with Byzantine shared memory. Distributed Computing, 18(5):387--408, 2006.
[2]
]]G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In Proc. ACM CCS, pages 598--609, 2007.
[3]
]]K. Birman, G. Chockler, and R. van Renesse. Towards a cloud computing research agenda. SIGACT News, 40(2), June 2009.
[4]
]]M. Blum, W. Evans, P. Gemmell, S. Kannan, and M. Naor. Checking the correctness of memories. Algorithmica, 12:225--244, 1994.
[5]
]]K. D. Bowers, A. Juels, and A. Oprea. Hail: A high-availability and integrity layer for cloud storage. Cryptology ePrint Archive, Report 2008/489, 2008. http://eprint.iacr.org/.
[6]
]]K. D. Bowers, A. Juels, and A. Oprea. Proofs of retrievability: Theory and implementation. Cryptology ePrint Archive, Report 2008/175, 2008. http://eprint.iacr.org/.
[7]
]]C. Cachin, I. Keidar, and A. Shraer. Fail-aware untrusted storage. In Proc. DSN 2009, to appear. Full paper available as Tech. Report CCIT 712, Department of Electrical Engineering, Technion, Dec. 2008.
[8]
]]C. Cachin, I. Keidar, and A. Shraer. Fork sequential consistency is blocking. IPL, 109(7), 2009.
[9]
]]C. Cachin, A. Shelat, and A. Shraer. Efficient fork-linearizable access to untrusted shared memory. In Proc. PODC, pages 129--138, 2007.
[10]
]]M. Castro and B. Liskov. Practical byzantine fault tolerance. In Proc. OSDI, pages 173--186, 1999.
[11]
]]B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz. Attested append-only memory: Making adversaries stick to their word. In Proc. SOSP, pages 189--204, 2007.
[12]
]]C. Fetzer and F. Cristian. Fail-awareness in timed asynchronous systems. In Proc. PODC, 1996.
[13]
]]E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh. Sirius: Securing remote untrusted storage. In Proc. NDSS, 2003.
[14]
]]J. Hendricks, G. R. Ganger, and M. K. Reiter. Low-overhead Byzantine fault-tolerant storage. In Proc. SOSP, 2007.
[15]
]]M. Herlihy. Wait-free synchronization. ACM TOPLAS, 11(1), 1991.
[16]
]]M. P. Herlihy and J. M. Wing. Linearizability: A correctness condition for concurrent objects. ACM TOPLAS, 12(3), 1990.
[17]
]]P. W. Hutto and M. Ahamad. Slow memory: Weakening consistency to enchance concurrency in distributed shared memories. In Proc. ICDCS, 1990.
[18]
]]A. Juels and B. S. K. Jr. Pors: proofs of retrievability for large files. In Proc. ACM CCS, pages 584--597, 2007.
[19]
]]L. Lamport. How to make a multiprocessor computer that correctly executes multiprocess progranm. IEEE Trans. Comput., 28(9):690--691, 1979.
[20]
]]J. Li, M. Krohn, D. Mazi` eres, and D. Shasha. Secure untrusted data repository (SUNDR). In Proc. OSDI, 2004.
[21]
]]J. Li and D. Mazières. Beyond one-third faulty replicas in Byzantine fault tolerant systems. In Proc. NSDI, 2007.
[22]
]]U. Maheshwari, R. Vingralek, and W. Shapiro. How to build a trusted database system on untrusted storage. In Proc. OSDI, 2000.
[23]
]]D. Malkhi and M. K. Reiter. Byzantine quorum systems. Distributed Computing, 11(4):203--213, 1998.
[24]
]]D. Mazières and D. Shasha. Building secure file systems out of Byzantine storage. In Proc. PODC, 2002.
[25]
]]R. C. Merkle. Protocols for public key cryptosystems. In IEEE Symposium on Security and Privacy, pages 122--134, 1980.
[26]
]]E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. Trans. Storage, 2(2):107--138, 2006.
[27]
]]A. Oprea and M. K. Reiter. On consistency of encrypted files. In Proc. DISC, 2006.
[28]
]]C. Papamanthou, R. Tamassia, and N. Triandopoulos. Authenticated hash tables. In Proc. ACM CCS, pages 437--448, 2008.
[29]
]]H. Shacham and B. Waters. Compact proofs of retrievability. In J. Pieprzyk, editor, Proceedings of Asiacrypt 2008, volume 5350 of LNCS, pages 90--107. Springer-Verlag, Dec. 2008.
[30]
]]D. B. Terry, M. Theimer, K. Petersen, A. J. Demers, M. Spreitzer, and C. Hauser. Managing update conflicts in Bayou, a weakly connected replicated storage system. In Proc. SOSP, 1995.
[31]
]]A. R. Yumerefendi and J. S. Chase. Strong accountability for network storage. ACM Transactions on Storage, 3(3), 2007.

Cited By

View all
  • (2024)Fully Geometric Panoramic Localization2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)10.1109/CVPR52733.2024.01968(20827-20837)Online publication date: 16-Jun-2024
  • (2024)Foundations of Information SecurityAI on the Edge with Security10.1007/978-3-031-78272-5_5(95-113)Online publication date: 25-Dec-2024
  • (2024)Information Security and Cloud ComputingIntroduction to Machine Learning with Security10.1007/978-3-031-59170-9_5(215-228)Online publication date: 13-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGACT News
ACM SIGACT News  Volume 40, Issue 2
June 2009
91 pages
ISSN:0163-5700
DOI:10.1145/1556154
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 June 2009
Published in SIGACT Volume 40, Issue 2

Check for updates

Qualifiers

  • Column

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Fully Geometric Panoramic Localization2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)10.1109/CVPR52733.2024.01968(20827-20837)Online publication date: 16-Jun-2024
  • (2024)Foundations of Information SecurityAI on the Edge with Security10.1007/978-3-031-78272-5_5(95-113)Online publication date: 25-Dec-2024
  • (2024)Information Security and Cloud ComputingIntroduction to Machine Learning with Security10.1007/978-3-031-59170-9_5(215-228)Online publication date: 13-Jul-2024
  • (2023)LDL: Line Distance Functions for Panoramic Localization2023 IEEE/CVF International Conference on Computer Vision (ICCV)10.1109/ICCV51070.2023.01639(17836-17846)Online publication date: 1-Oct-2023
  • (2022)A Hybrid Multi-Cloud Framework Using the IBBE Key Management System for Securing Data StorageSustainability10.3390/su14201356114:20(13561)Online publication date: 20-Oct-2022
  • (2022)Privacy-Preserving Public Auditing for Shared Data in Mobile Cloud Storage2022 IEEE/ACM 7th Symposium on Edge Computing (SEC)10.1109/SEC54971.2022.00074(486-491)Online publication date: Dec-2022
  • (2022)Privacy preservation of cloud data in business application enabled by multi-objective red deer-bird swarm algorithmKnowledge-Based Systems10.1016/j.knosys.2021.107748236:COnline publication date: 25-Jan-2022
  • (2022)Cloud Computing and Information SecurityCloud Computing with Security and Scalability.10.1007/978-3-031-07242-0_7(113-146)Online publication date: 4-Sep-2022
  • (2021)Information Security and Cloud ComputingIntroduction to Machine Learning in the Cloud with Python10.1007/978-3-030-71270-9_6(143-155)Online publication date: 29-Apr-2021
  • (2020)Analysis of a Randomized Controlled Trial of Student Performance in Parallel Programming using a New Measurement TechniqueACM Transactions on Computing Education10.1145/340189220:3(1-28)Online publication date: 9-Sep-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media