Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2896387.2896411acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccConference Proceedingsconference-collections
research-article

Multiple-Clouds Computing Security Approaches: A Comparative Study

Published: 22 March 2016 Publication History

Abstract

Relying on a single cloud as a storage service is not a proper solution for a number of reasons; for instance, the data could be captured while being uploaded to the cloud, and the data could be stolen from the cloud using a stolen ID. There are a number of approaches that have been developed in order to provide a secure data storage relying on the multiple-cloud paradigms. Through this paper we will study, and evaluate the existing approaches that have been proposed as a solution for multiple cloud storage systems in terms of security, privacy, and integrity. In addition, we will provide a brief overview of the concept of information dispersal strategies and provide an overview of state-of-the-art multiple cloud storage approaches. After that, all these approaches will be analysed with respect to pre-defined criteria/properties. Finally, we identify and highlight the obstacles/limitation in terms of usability, operational cost, and the lack of security, privacy, integrity, and access features for these approaches, which are very critical direction for future research on multiple cloud storage.

References

[1]
L. Kelion, "Apple toughens iCloud security after celebrity breach", Available at: http://goo.gl/vyxS3S {Last accessed on November 11, 2015}.
[2]
M. Hogan, F. Liu, A. Sokol and J. Tong, "Nist cloud computing standards roadmap," NIST Special Publication, vol. 35, 2011.
[3]
M. Vukolić, "The Byzantine empire in the intercloud," ACM SIGACT News, vol. 41, pp. 105--111, 2010.
[4]
M. AlZain, B. Soh and E. Pardede, "A Byzantine Fault Tolerance Model for a Multi-cloud Computing," in Computational Science and Engineering (CSE), 2013 IEEE 16th International Conference on, pp. 130--137, 2013.
[5]
Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, "DepSky: dependable and secure storage in a cloud-of-clouds," ACM Transactions on Storage (TOS), vol. 9, pp. 12, 2013.
[6]
P. Verissimo, A. Bessani and M. Pasin, "The TClouds architecture: Open and resilient cloud-of-clouds computing," in Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on, pp. 1--6, 2012.
[7]
P. Riteau, "Building dynamic computing infrastructures over distributed clouds," in Network Cloud Computing and Applications (NCCA), 2011 First International Symposium on, pp. 127--130, 2011.
[8]
N. Grozev and R. Buyya, "Inter-Cloud architectures and application brokering: taxonomy and survey," Software: Practice and Experience, vol. 44, pp. 369--390, 2014.
[9]
H.S. Alqahtani and G. Kouadri-Mostefaoui, "Towards a Classification of Multiple-Cloud Computing Concepts and Terms," in Advances in Service-Oriented and Cloud Computing, Springer, 2014, pp. 271--277.
[10]
S. Chen, S. Nepal and R. Liu, "Secure connectivity for intra-cloud and inter-cloud communication," in Parallel Processing Workshops (ICPPW), 2011 40th International Conference on, pp. 154--159, 2011.
[11]
A.J. Ferrer, F. HernáNdez, J. Tordsson, E. Elmroth, A. Ali-Eldin, C. Zsigri, R. Sirvent, J. Guitart, R.M. Badia and K. Djemame, "OPTIMIS: A holistic approach to cloud service provisioning," Future Generation Comput.Syst., vol. 28, pp. 66--77, 2012.
[12]
M.O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," Journal of the ACM (JACM), vol. 36, pp. 335--348, 1989.
[13]
J. Spillner and A. Schill, "Towards Dispersed Cloud Computing," in Communications and Networking (BlackSeaCom), 2014 IEEE International Black Sea Conference on, pp. 170--174, 2014.
[14]
Bessani, L.A. Cutillo, G. Ramunno, N. Schirmer and P. Smiraglia, "The TClouds platform: concept, architecture and instantiations," in Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing, pp. 1, 2013.
[15]
J. Spillner and J. Müller, "Tutorial on Distributed Data Storage: From Dispersed Files to Stealth Databases," in Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, pp. 535--536, 2014.
[16]
Shamir, "How to share a secret," Commun ACM, vol. 22, pp. 612--613, 1979.
[17]
H. Krawczyk, "Secret sharing made short," in Advances in Cryptology---CRYPTO'93, pp. 136--146, 1994.
[18]
J. Spillner, G. Bombach, S. Matthischke, J. Müller, R. Tzschichholz and A. Schill, "Information dispersion over redundant arrays of optimal cloud storage for desktop users," in Utility and Cloud Computing (UCC), 2011 Fourth IEEE International Conference on, pp. 1--8, 2011.
[19]
J.K. Resch and J.S. Plank, "AONT-RS: Blending Security and Performance in Dispersed Storage Systems," in Proceedings of the 9th USENIX Conference on File and Stroage Technologies, pp. 14--14, 2011.
[20]
M.W. Storer, K.M. Greenan, E.L. Miller and K. Voruganti, "POTSHARDS---a secure, recoverable, long-term archival storage system," ACM Transactions on Storage (TOS), vol. 5, pp. 5, 2009.
[21]
S. Kamara, C. Papamanthou and T. Roeder, "Cs2: A searchable cryptographic cloud storage system," Microsoft Research, TechReport MSR-TR-2011-58, 2011.
[22]
Tchana, L. Broto and D. Hagimont, "Approaches to cloud computing fault tolerance," in Computer, Information and Telecommunication Systems (CITS), 2012 International Conference on, pp. 1--6, 2012.
[23]
W. Zhao, P. Melliar-Smith and L.E. Moser, "Fault tolerance middleware for cloud computing," in Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, pp. 67--74, 2010.
[24]
L. Wu, B. Liu and W. Lin, "A dynamic data fault-tolerance mechanism for cloud storage," in Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on, pp. 95--99, 2013.
[25]
Correia, P. Costa, M. Pasin, A. Bessani, F. Ramos and P. Verissimo, "On the feasibility of byzantine fault-tolerant mapreduce in clouds-of-clouds," in Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on, pp. 448--453, 2012.
[26]
Garraghan, P. Townend and J. Xu, "Byzantine fault-tolerance in federated cloud computing," in Service Oriented System Engineering (SOSE), 2011 IEEE 6th International Symposium on, pp. 280--285, 2011.
[27]
Malik and F. Huet, "Adaptive fault tolerance in real time cloud computing," in Services (SERVICES), 2011 IEEE World Congress on, pp. 280--287, 2011.
[28]
H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, "RACS: a case for cloud storage diversity," in Proceedings of the 1st ACM symposium on Cloud computing, pp. 229--240, 2010.
[29]
Cachin, R. Haas and M. Vukolic, Dependable Storage in the Intercloud, 2010.
[30]
G. Chockler, R. Guerraoui, I. Keidar and M. Vukolic, "Reliable distributed storage," Computer, pp. 60--67, 2009.
[31]
E. Stefanov, M. van Dijk, A. Juels and A. Oprea, "Iris: A scalable cloud file system with efficient integrity checks," in Proceedings of the 28th Annual Computer Security Applications Conference, pp. 229--238, 2012.
[32]
Z. Wilcox-O'Hearn and B. Warner, "Tahoe: the least-authority filesystem," in Proceedings of the 4th ACM international workshop on Storage security and survivability, pp. 21--26, 2008.
[33]
R.A. Popa, J.R. Lorch, D. Molnar, H.J. Wang and L. Zhuang, "Enabling Security in Cloud Storage SLAs with CloudProof." in USENIX Annual Technical Conference, 2011.
[34]
C. Băsescu, C. Cachin, I. Eyal, R. Haas, A. Sorniotti, M. Vukolić and I. Zachevsky, "Robust data sharing with key-value stores," in Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on, pp. 1--12, 2012.
[35]
G. Kecskemeti, A. Kertesz, A. Marosi and P. Kacsuk, "Interoperable resource management for establishing federated clouds," Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice, vol. 2, pp. 18--35, 2012.
[36]
K.D. Bowers, A. Juels and A. Oprea, "HAIL: a high-availability and integrity layer for cloud storage," in Proceedings of the 16th ACM conference on Computer and communications security, pp. 187--198, 2009.

Cited By

View all
  • (2017)Secure Self-Destruction of Shared Data in Multi-CloudIoT2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)10.1109/FiCloud.2017.31(161-168)Online publication date: Aug-2017

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICC '16: Proceedings of the International Conference on Internet of things and Cloud Computing
March 2016
535 pages
ISBN:9781450340632
DOI:10.1145/2896387
© 2016 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Multiple cloud
  2. access privacy
  3. cloud storage
  4. information dispersal
  5. multi-cloud
  6. storage security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICC '16

Acceptance Rates

Overall Acceptance Rate 213 of 590 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Secure Self-Destruction of Shared Data in Multi-CloudIoT2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)10.1109/FiCloud.2017.31(161-168)Online publication date: Aug-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media