Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1966445.1966449acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

DepSky: dependable and secure storage in a cloud-of-clouds

Published: 10 April 2011 Publication History

Abstract

The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databases, power system historical information and financial data are some examples of critical data that could be moved to the cloud. However, the reliability and security of data stored in the cloud still remain major concerns. In this paper we present DEPSKY, a system that improves the availability, integrity and confidentiality of information stored in the cloud through the encryption, encoding and replication of the data on diverse clouds that form a cloud-of-clouds. We deployed our system using four commercial clouds and used PlanetLab to run clients accessing the service from different countries. We observed that our protocols improved the perceived availability and, in most cases, the access latency when compared with cloud providers individually. Moreover, the monetary costs of using DEPSKY on this scenario is twice the cost of using a single cloud, which is optimal and seems to be a reasonable cost, given the benefits.

References

[1]
Amazon S3 FAQ: What data consistency model does amazon S3 employ? http://aws.amazon.com/s3/faqs/, 2010.
[2]
Project TCLOUDS -- trustworthy clouds - privacy and resilience for Internet-scale critical infrastructure. http://www.tclouds-project.eu/, 2010.
[3]
UK NHS Systems and Services. http://www.connectingforhealth.nhs.uk/, 2010.
[4]
Ittai Abraham, Gregory Chockler, Idit Keidar, and Dahlia Malkhi. Byzantine disk Paxos: optimal resilience with Byzantine shared memory. Distributed Computing, 18 (5): 387--408, April 2006.
[5]
Hussam Abu-Libdeh, Lonnie Princehouse, and Hakim Weatherspoon. RACS: A case for cloud storage diversity. Proc. of the 1st ACM Symposium on Cloud Computing, pages 229--240, June 2010.
[6]
Hagit Attiya and Amir Bar-Or. Sharing memory with semi-Byzantine clients and faulty storage servers. In Proc. of the 22rd IEEE Symposium on Reliable Distributed Systems - SRDS 2003, pages 174--183, October 2003.
[7]
Alysson N. Bessani, Eduardo P. Alchieri, Miguel Correia, and Joni S. Fraga. DepSpace: a Byzantine fault-tolerant coordination service. In Proc. of the 3rd ACM European Systems Conference -- EuroSys'08, pages 163--176, April 2008.
[8]
Kevin D. Bowers, Ari Juels, and Alina Oprea. HAIL: a high-availability and integrity layer for cloud storage. In Proc. of the 16th ACM Conference on Computer and Communications Security - CCS'09, pages 187--198, 2009.
[9]
Matthias Brantner, Daniela Florescu, David Graf, Donald Kossmann, and Tim Kraska. Building a database on S3. In Proc. of the 2008 ACM SIGMOD International Conference on Management of Data, pages 251--264, 2008.
[10]
Christian Cachin and Stefano Tessaro. Optimal resilience for erasure-coded Byzantine distributed storage. In Proc. of the Int. Conference on Dependable Systems and Networks - DSN 2006, pages 115--124, June 2006.
[11]
Gregory Chockler, Rachid Guerraoui, Idit Keidar, and Marko Vukolić. Reliable distributed storage. IEEE Computer, 42 (4): 60--67, 2009.
[12]
Gregory Chockler and Dahlia Malkhi. Active disk Paxos with infinitely many processes. In Proc. of the 21st Symposium on Principles of Distributed Computing -- PODC'02, pages 78--87, 2002.
[13]
Ariel J. Feldman, William P. Zeller, Michael J. Freedman, and Edward W. Felten. SPORC: Group collaboration using untrusted cloud resources. In Proc. of the 9th USENIX Symposium on Operating Systems Design and Implementation -- OSDI'10, pages 337--350, October 2010.
[14]
Eli Gafni and Leslie Lamport. Disk Paxos. Distributed Computing, 16 (1): 1--20, 2003.
[15]
Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung. The Google file system. In Proc. of the 19th ACM Symposium on Operating Systems Principles -- SOSP'03, pages 29--43, 2003.
[16]
Garth Gibson, David Nagle, Khalil Amiri, Jeff Butler, Fay Chang, Howard Gobioff, Charles Hardin, Erik Riedel, David Rochberg, and Jim Zelenka. A cost-effective, high-bandwidth storage architecture. In Proc. of the 8th Int. Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS'98, pages 92--103, 1998.
[17]
Garth Goodson, Jay Wylie, Gregory Ganger, and Micheal Reiter. Efficient Byzantine-tolerant erasure-coded storage. In Proc. of the Int. Conference on Dependable Systems and Networks - DSN'04, pages 135--144, June 2004.
[18]
Melvin Greer. Survivability and information assurance in the cloud. In Proc. of the 4th Workshop on Recent Advances in Intrusion-Tolerant Systems -- WRAITS'10, 2010.
[19]
James Hamilton. On designing and deploying Internet-scale services. In Proc. of the 21st Large Installation System Administration Conference -- LISA'07, pages 231--242, 2007.
[20]
James Hendricks, Gregory Ganger, and Michael Reiter. Low-overhead byzantine fault-tolerant storage. In Proc. of the 21st ACM Symposium on Operating Systems Principles -- SOSP'07, pages 73--86, 2007.
[21]
Alyssa Henry. Cloud storage FUD (failure, uncertainty, and durability). Keynote Address at the 7th USENIX Conference on File and Storage Technologies, February 2009.
[22]
Maurice Herlihy, Victor Lucangco, and Mark Moir. Obstruction-free syncronization: double-ended queues as an example. In Proc. of the 23th IEEE Int. Conference on Distributed Computing Systems - ICDCS 2003, pages 522--529, July 2003.
[23]
Patrick Hunt, Mahadev Konar, Flavio Junqueira, and Benjamin Reed. Zookeeper: Wait-free coordination for Internet-scale services. In Proc. of the USENIX Annual Technical Conference -- ATC 2010, pages 145--158, June 2010.
[24]
Prasad Jayanti, Tushar Deepak Chandra, and Sam Toueg. Fault-tolerant wait-free shared objects. Journal of the ACM, 45 (3): 451--500, May 1998.
[25]
Hugo Krawczyk. Secret sharing made short. In Proc. of the 13th Int. Cryptology Conference -- CRYPTO'93, pages 136--146, August 1993.
[26]
Leslie Lamport. On interprocess communication (part II). Distributed Computing, 1 (1): 203--213, January 1986.
[27]
Leslie Lamport, Robert Shostak, and Marshall Pease. The Byzantine generals problem. ACM Transactions on Programing Languages and Systems, 4 (3): 382--401, July 1982.
[28]
Barbara Liskov and Rodrigo Rodrigues. Tolerating Byzantine faulty clients in a quorum system. In Proc. of the 26th IEEE Int. Conference on Distributed Computing Systems - ICDCS'06, July 2006.
[29]
Prince Mahajan, Srinath Setty, Sangmin Lee, Allen Clement, Lorenzo Alvisi, Mike Dahlin, and Michael Walfish. Depot: Cloud storage with minimal trust. In Proc. of the 9th USENIX Symposium on Operating Systems Design and Implementation -- OSDI 2010, pages 307--322, October 2010.
[30]
Dahlia Malkhi and Michael Reiter. Byzantine quorum systems. Distributed Computing, 11 (4): 203--213, 1998.
[31]
Dahlia Malkhi and Michael Reiter. Secure and scalable replication in Phalanx. In Proc. of the 17th IEEE Symposium on Reliable Distributed Systems - SRDS'98, pages 51--60, October 1998.
[32]
Jean-Philippe Martin, Lorenzo Alvisi, and Mike Dahlin. Minimal Byzantine storage. In Proc. of the 16th Int. Symposium on Distributed Computing -- DISC 2002, pages 311--325, 2002.
[33]
John C. McCullough, JohnDunagan, Alec Wolman, and Alex C. Snoeren. Stout: An adaptive interface to scalable cloud storage. In Proc. of the USENIX Annual Technical Conference -- ATC 2010, pages 47--60, June 2010.
[34]
Cade Metz. DDoS attack rains down on Amazon cloud. The Register, October 2009. http://www.theregister.co.uk/2009/10/05/amazon_bitbucket_outage/.
[35]
Kiran-Kumar Muniswamy-Reddy, Peter Macko, and Margo Seltzer. Provenance for the cloud. In Proc. of the 8th USENIX Conference on File and Storage Technologies -- FAST'10, pages 197--210, 2010.
[36]
Erica Naone. Are we safeguarding social data? Technology Review published by MIT Review, http://www.technologyreview.com/blog/editors/22924/, February 2009.
[37]
James S. Plank. Jerasure: A library in C/C facilitating erasure coding for storage applications. Technical Report CS-07-603, University of Tennessee, September 2007.
[38]
Michael Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM, 36 (2): 335--348, February 1989.
[39]
David Sarno. Microsoft says lost sidekick data will be restored to users. Los Angeles Times, Oct. 15th 2009.
[40]
Berry Schoenmakers. A simple publicly verifiable secret sharing scheme and its application to electronic voting. In Proc. of the 19th Int. Cryptology Conference -- CRYPTO'99, pages 148--164, August 1999.
[41]
Adi Shamir. How to share a secret. Communications of ACM, 22 (11): 612--613, November 1979.
[42]
Alexander Shraer, Christian Cachin, Asaf Cidon, Idit Keidar, Yan Michalevsky, and Dani Shaket. Venus: Verification for untrusted cloud storage. In Proc. of the ACM Cloud Computing Security Workshop -- CCSW'10, 2010.
[43]
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, and Kaladhar Voruganti. Potshards: Secure long-term storage without encryption. In Proc. of the USENIX Annual Technical Conference -- ATC 2007, pages 143--156, June 2007.
[44]
Werner Vogels. Eventually consistent. Communications of the ACM, 52 (1): 40--44, 2009.
[45]
Michael Vrable, Stefan Savage, and Geoffrey M. Voelker. Cumulus: Filesystem backup to the cloud. ACM Transactions on Storage, 5 (4): 1--28, 2009.
[46]
Marko Vukolic. The Byzantine empire in the intercloud. ACM SIGACT News, 41 (3): 105--111, 2010.
[47]
Sage A. Weil, Scott A. Brandt, Ethan L. Miller, Darrell D. E. Long, and Carlos Maltzahn. Ceph: A scalable, high-performance distributed file system. In Proc. of the 7th USENIX Symposium on Operating Systems Design and Implementation -- OSDI 2006, pages 307--320, 2006.

Cited By

View all
  • (2022)A Survey on Integrity Auditing for Data Storage in the Cloud: From Single Copy to Multiple ReplicasIEEE Transactions on Big Data10.1109/TBDATA.2020.30292098:5(1428-1442)Online publication date: 1-Oct-2022
  • (2022)Methods of Information Security in Cloud StoragesTransportation Research Procedia10.1016/j.trpro.2022.01.07461(455-461)Online publication date: 2022
  • (2021)Cloud Storage Service Architecture Providing the Eventually Consistent Totally Ordered Commit History of Distributed Key-Value Stores for Data Consistency VerificationElectronics10.3390/electronics1021270210:21(2702)Online publication date: 5-Nov-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
EuroSys '11: Proceedings of the sixth conference on Computer systems
April 2011
370 pages
ISBN:9781450306348
DOI:10.1145/1966445
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 April 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. byzantine quorum systems
  2. cloud computing
  3. cloud storage

Qualifiers

  • Research-article

Conference

EuroSys '11
Sponsor:
EuroSys '11: Sixth EuroSys Conference 2011
April 10 - 13, 2011
Salzburg, Austria

Acceptance Rates

EuroSys '11 Paper Acceptance Rate 24 of 161 submissions, 15%;
Overall Acceptance Rate 241 of 1,308 submissions, 18%

Upcoming Conference

EuroSys '25
Twentieth European Conference on Computer Systems
March 30 - April 3, 2025
Rotterdam , Netherlands

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)A Survey on Integrity Auditing for Data Storage in the Cloud: From Single Copy to Multiple ReplicasIEEE Transactions on Big Data10.1109/TBDATA.2020.30292098:5(1428-1442)Online publication date: 1-Oct-2022
  • (2022)Methods of Information Security in Cloud StoragesTransportation Research Procedia10.1016/j.trpro.2022.01.07461(455-461)Online publication date: 2022
  • (2021)Cloud Storage Service Architecture Providing the Eventually Consistent Totally Ordered Commit History of Distributed Key-Value Stores for Data Consistency VerificationElectronics10.3390/electronics1021270210:21(2702)Online publication date: 5-Nov-2021
  • (2021)Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop InfrastructureProceedings of the 37th Annual Computer Security Applications Conference10.1145/3485832.3485886(285-296)Online publication date: 6-Dec-2021
  • (2021)Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach with Fast RecoveryIEEE Transactions on Cloud Computing10.1109/TCC.2018.28711819:2(546-561)Online publication date: 1-Apr-2021
  • (2021)A Contemporary Framework Key Based Crypto Method to Enhance Security in Multi Cloud Ambience2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)10.1109/ICCCIS51004.2021.9397100(275-280)Online publication date: 19-Feb-2021
  • (2021)An improved security and privacy management system for data in multi-cloud environments using a hybrid approachEvolutionary Intelligence10.1007/s12065-020-00555-w14:2(1117-1133)Online publication date: 10-Feb-2021
  • (2021)Trust Management Framework for Handling Security Issues in Multi-cloud EnvironmentOperationalizing Multi-Cloud Environments10.1007/978-3-030-74402-1_16(287-306)Online publication date: 18-Sep-2021
  • (2020)Stochastic Workload Scheduling for Uncoordinated Datacenter Clouds with Multiple QoS ConstraintsIEEE Transactions on Cloud Computing10.1109/TCC.2016.25860488:4(1284-1295)Online publication date: 1-Oct-2020
  • (2020)Recent Trends on Security Issues in Multi-Cloud Computing: A Survey2020 International Conference on Smart Electronics and Communication (ICOSEC)10.1109/ICOSEC49089.2020.9215303(777-781)Online publication date: Sep-2020
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media