Title :
Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms
Author :
Feng, Jun ; Chen, Yu ; Ku, Wei-Shinn ; Liu, Pu
Author_Institution :
Dept. of Electr. & Comput. Eng., SUNY - Binghamton, Binghamton, NY, USA
Abstract :
Data storage technologies have been recognized as one of the major dimensions of information management along with the network infrastructure and applications. The prosperity of cloud computing requires the migration from server-attached storage to network-based distributed storage. Along with variant advantages, distributed storage also poses new challenges in creating a secure and reliable data storage and access facility. The data security in cloud is one of the challenges to be addressed before the novel pay-as-you-go business model can be accepted and applied widely. Concerns are raised from both insecure/unreliable service providers and potential malicious users. In this article, we analyze the integrity vulnerability existing in the current cloud storage platforms and show the problem of repudiation. A novel non-repudiation (NR) protocol specifically designed in the context of cloud computing environment is proposed. We have also discussed the robustness of the NR protocol against typical attacks in the network environments.
Keywords :
Internet; computer network security; protocols; storage management; Cloud computing environment; Cloud data security; Cloud data storage platforms; information management; insecure-unreliable service providers; integrity vulnerabilities analysis; network-based distributed storage; nonrepudiation protocol; server-attached storage; Authentication; Cloud computing; Clouds; Google; Protocols; Cloud Computing; Data Integrity; Non-Repudiation; Storage Security;
Conference_Titel :
Parallel Processing Workshops (ICPPW), 2010 39th International Conference on
Conference_Location :
San Diego, CA
Print_ISBN :
978-1-4244-7918-4
Electronic_ISBN :
1530-2016
DOI :
10.1109/ICPPW.2010.42