Real-time proof of violation for cloud storage

Gwan Hwan Hwang, Wei Sian Huang, Jenn Zjone Peng

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

In this paper we define and explore proof of violation (POV) for cloud storage systems. A POV scheme enables a user or a service provider to produce a precise proof of either the occurrence of the violation of properties or the innocence of the service provider. POV schemes are solutions for obtaining mutual nonrepudiation between users and the service provider in the cloud. Existing solutions for obtaining mutual nonrepudiation only support epoch-based POV. The drawback of an epoch-based POV scheme is that violation of properties can only be detected at the end of an epoch. We propose a real-time POV scheme in which the auditing can be performed at the time of each file operation. To the best of our knowledge, it is the first scheme that can perform real-time POV for cloud storage. In addition, each client device only needs to store a partial hash tree of files in an account. Experimental results are presented that demonstrate the feasibility of the proposed scheme. Service providers of cloud storage can use the proposed scheme to provide a mutual nonrepudiation guarantee in their service-level agreements.

Original languageEnglish
Title of host publicationProceedings - 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, CloudCom 2014
PublisherIEEE Computer Society
Pages394-399
Number of pages6
EditionFebruary
ISBN (Electronic)9781479940936
DOIs
Publication statusPublished - 2015 Feb 9
Event2014 6th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2014 - Singapore, Singapore
Duration: 2014 Dec 152014 Dec 18

Publication series

NameProceedings of the International Conference on Cloud Computing Technology and Science, CloudCom
NumberFebruary
Volume2015-February
ISSN (Print)2330-2194
ISSN (Electronic)2330-2186

Other

Other2014 6th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2014
CountrySingapore
CitySingapore
Period14/12/1514/12/18

Keywords

  • Cloud security
  • Cloud storage
  • Nonrepudiation
  • Proof of violation
  • Service-level agreement

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Software
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'Real-time proof of violation for cloud storage'. Together they form a unique fingerprint.

  • Cite this

    Hwang, G. H., Huang, W. S., & Peng, J. Z. (2015). Real-time proof of violation for cloud storage. In Proceedings - 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, CloudCom 2014 (February ed., pp. 394-399). [7037694] (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom; Vol. 2015-February, No. February). IEEE Computer Society. https://doi.org/10.1109/CloudCom.2014.18