Abstract
Cloud computing is an emerging computing paradigm that is rapidly gaining attention as an alternative to other traditional hosted application models. The cloud environment provides on-demand, elastic and scalable services, moreover, it can provide these services at lower costs. However, this new paradigm poses new security issues and threats because cloud service providers are not in the same trust domain of cloud customers. Furthermore, data owners cannot control the underlying cloud environment. Therefore, new security practices are required to guarantee the availability, integrity, privacy and confidentiality of the outsourced data. This paper highlights the main security challenges of the cloud storage service and introduces some solutions to address those challenges. The proposed solutions present a way to protect the data integrity, privacy and confidentiality by integrating data auditing and access control methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Attebury, R., George, J., Judd, C., Marcum, B.: Google docs: a review. Against Grain 20(2), 14–17 (2008)
Tim, M., Subra, K., Shahed, L.: Cloud Security and Privacy. O’Reilly and Associates, USA (2009)
Chambers, J.: Windows Azure Web Sites. Wiley (2013)
Pandey, U.S., Anjali, J.: Google app engine and performance of the web application. Int. J. 2(2) (2013)
Gonzalez, C., Border, C., Oh, T.: Teaching in amazon EC2. In: The 13th Annual ACM SIGITE Conference on Information Technology Education. ACM (2013)
Srinivasan, S.: Cloud computing providers. In: Cloud Computing Basics. Springer, New York (2014)
Bhadauria, R., Sanyal, S.: Survey on security issues in cloud computing and associated mitigation techniques. Int. J. Comput. Appl. 47(18), 47–66 (2012)
Borgmann, M., Hahn, T., Herfert, M., Kunz, T., Richter M., Viebeg, U., Vowe, S.: On the Security of Cloud Storage Services. Fraunhofer-Verlag (2012)
Berriman, G.B., Deelman, E., Good, J., Juve, G., Kinney, J., Merrihew, A., Rynge, M.: Creating A Galactic Plane Atlas With Amazon Web Services (2013). arXiv:1312.6723
Garg, S.K., Versteeg, S., Buyya, R.: A framework for ranking of cloud computing services. Future Gener. Comput. Syst. 29(4), 1012–1023 (2013)
Miller, R.: Amazon Addresses EC2 Power Outages. Data Center Knowledge (2010). http://www.datacenterknowledge.com/archives/2010/05/10/amazon-addresses-ec2-power-outages/
Aboalian, A., Badr, N.L., Tolba, M.F.: Keystroke dynamics based user authentication service for cloud computing. In: Practice and Experience: Concurrency and Computation (2015)
Cong, W., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)
Shalabi, S.M., Doll, C.L., Reilly, J.D., Shore, M.: Access Control List. U.S. Patent Application 13/311, 278 (2011)
Abo-alian, A., Badr, N.L., Tolba, M.F.: Hierarchical attribute-role based access control for cloud computing. In: The 1st International Conference on Advanced Intelligent System and Informatics (AISI2015). Springer (2016)
Blum, M., Evans, W., Gemmell, P., Kannan, S., Naor, M.: Checking the correctness of memories. In: The 32nd Annual Symposium on Foundations of Computer Science. IEEE Computer Society, Washington, DC, USA (1991)
Liu, H., Zhang, P., Lun, J.: Public data integrity verification for secure cloud storage. J. Netw. 8(2), 373–380 (2013)
Yang, K., Xiaohua, J.: TSAS: third-party storage auditing service. In: Security for Cloud Storage Systems. Springer Briefs in Computer Science (2014)
Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: The 2007 ACM Conference on Computer and Communications Security. ACM (2007)
Juels, A., Kaliski, B.S.: Pors: proofs of retrievability for large files. In: The 2007 ACM Conference on Computer and Communications Security. ACM (2007)
Zheng, Q., Xu, S.: Secure and efficient proof of storage with deduplication. In: The Second ACM Conference on Data and Application Security and Privacy. ACM (2012)
Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4), 409–428 (2012)
Chen, B., Curtmola, R.: Robust dynamic provable data possession. In: The 32nd International IEEE Conference on Distributed Computing Systems Workshops. IEEE (2012)
Mukundan, R., Madria, S., Linderman, M.: Replicated data integrity verification in cloud. IEEE Data Eng. Bull. 35(4), 55–64 (2012)
Chen, B., Curtmola, R.: Towards self-repairing replication-based storage systems using untrusted clouds. In: The 3rd ACM Conference on Data and Application Security and Privacy (CODASPY ’13). ACM (2013)
Etemad, M., Kupcu, A.: Transparent distributed and replicated dynamic provable data possession. In: The 11th International Conference on Applied Cryptography and Network. Springer, Berlin (2013)
Zhu, Y., Ahn, G., Hu, H., Yau, S.S., An, H.G., Hu, C.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2013)
Abo-alian, A., Badr, N.L., Tolba, M.F.: Auditing-as-a-service for cloud storage. In: Intelligent Systems’ 2014. Springer (2015)
Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442–483 (2013)
Plank, J.S.: A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems. Softw. Pract. Exp. 27(9), 995–1012 (1997)
Yuan, J., Yu, S.: Proof of retrievability with public verifiability and constant communication cost in cloud. In: The 2013 International ACM Workshop on Security in Cloud Computing. ACM (2013)
Xu, J., Chang, E.C.: Towards efficient provable data possession. In: IACR Cryptology ePrint Archive 574. ASIACCS (2011)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1), 121–155 (2011)
Cao, N., Yu, S., Yang, Z., Lou, W., Hou, Y.T.: LT codes-based secure and reliable cloud storage service. In: The 2012 INFOCOM. IEEE (2012)
Rashmi, K.V., Shah, N.B., Kumar, P.V., Ramchandran, K.: Exact regenerating codes for distributed storage. In: Allerton Conference on Control Computing and Communication (2009)
Barsoum, A.F., Hasan, M.A.: On verifying dynamic multiple data copies over cloud servers. IACR Cryptol. ePrint Arch. 447 (2011)
Barsoum, A.F., Hasan, M.A.: Integrity verification of multiple data copies over untrusted cloud servers. In: The 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (2012)
Zhu, Y., Hu, H., Ahn, G.J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)
Wang, H., Zhang, Y.: On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 25(1), 264–267 (2014)
Merkle, R.C.: Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy. IEEE Computer Society (1980)
Zhang, Y., Blanton, M.: Efficient dynamic provable possession of remote data via balanced update trees. In: The 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (2013)
Pugh, W.: Skip lists: a probabilistic alternative to balanced trees. Commun. ACM 33(6), 668–676 (1990)
Goodrich, M.T., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: DARPA Information Survivability Conference (2001)
Erway, C., Kp, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: The 16th ACM Conference on Computer and Communications Security. ACM (2009)
Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Advances in Cryptology CRYPTO99. Springer, Heidelberg (1999)
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)
Liu, F., Gu, D., Lu, H.: An improved dynamic provable data possession model. In: The IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE (2011)
Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
Ateniese, G., Kamara, S., Katz, J.: Proofs of Storage from homomorphic identification protocols. In: The 15th International Conference on Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT). Springer, Heidelberg (2009)
Li, C., Chen, Y., Tan, P., Yang, G.: An efficient provable data possession scheme with data dynamics. In: Tthe International Conference on Computer Science and Service System (CSSS). IEEE (2012)
Li, C., Chen, Y., Tan, P., Yang, G.: Towards comprehensive provable data possession in cloud computing. Wuhan Univ. J. Nat. Sci. 18(3), 265–271 (2013)
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1996)
Li, N.: Discretionary access control. In: Encyclopedia of Cryptography and Security. Springer (2011)
Lindqvist, H.: Mandatory access control. Master’s Thesis in Computing Science, Umea University, Department of Computing Science (2006)
Ferraiolo, D., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control. Artech House (2003)
Cha, B., Seo, J., Kim, J.: Design of attribute-based access control in cloud computing environment. In: The International Conference on IT Convergence and Security. Springer, Netherlands (2012)
Yu, S.: Data sharing on untrusted storage with attribute-based encryption. PhD diss, Worcester Polytechnic Institute (2010)
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: scalable secure file sharing on untrusted storage. In: FAST03 Berkeley, California, USA (2003)
Vimercati, S.D.C. di, Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: management of access control evolution on outsourced data. In: The 33rd International Conference on Very Large Data Bases, VLDB Endowment (2007)
Goh, E., Shacham, H., Modadugu, N., Boneh, D.: Sirius: securing remote untrusted storage. In: NDSS 03, San Diego, CA, USA (2003)
Fiat, A., Naor, M.: Broadcast encryption. In: CRYPTO 93 (Lecture Notes in Computer Science), Santa Barbara, CA, USA (1993)
Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In: CRYPTO 02 (Lecture Notes in Computer Science), Santa Barbara, CA, USA (2002)
Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Proceedings of CRYPTO 05 (Lecture Notes in Computer Science), Santa Barbara, CA, USA (2005)
Delerable, C., Paillier, P., Pointcheval, D.: Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In: Pairing-Based Cryptography Pairing 2007. Springer, Heidelberg (2007)
Kim, J., Susilo, W., Au, M.H., Seberry, J.: Efficient semi-static secure broadcast encryption scheme. In: Pairing-Based Cryptography Pairing 2013. Springer (2014)
Gentry, C., Waters, B.: Adaptive security in broadcast encryption systems (with short ciphertexts). In: Advances in Cryptology-EUROCRYPT 2009. Springer, Heidelberg (2009)
Wikipedia: ID-based encryption (2014). http://en.wikipedia.org/wiki/ID-based_encryption
Li, J., Chen, X., Jia, C., Lou, W.: Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 1–12 (2013)
Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: EUROCRYPT 02 (Lecture Notes in Computer Science), Amsterdam, The Netherlands (2002)
Gentry, C., Halevi, S.: Hierarchical identity based encryption with polynomially many levels. In: TCC 09 (Lecture Notes in Computer Science), San Francisco, CA, USA (2009)
Gagn, M.: Identity-based encryption. In: Encyclopedia of Cryptography and Security. Springer Science Business Media, LLC (2011)
Liu, Q., Wang, G., Wu, J.: Efficient sharing of secure cloud storage services. In: IEEE TSP 10 in Conjunction with IEEE CIT 10, Bradford, UK (2010)
Mao, Y., Zhang, X., Chen, M., Zhan, Y.: Constant size hierarchical identity-based encryption tightly secure in the full model without random oracles. In: The 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT). IEEE (2013)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: EUROCRYPT 05 (Lecture Notes in Computer Science), Aarhus, Denmark (2005)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS 06, Alexandria, VA, USA (2006)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public Key Cryptography|PKC, LNCS. Springer (2011)
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: The 2010 IEEE INFOCOM. IEEE (2010)
Si, X., Wang, P., Zhang, L.: KP-ABE based verifiable cloud access control scheme. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE (2013)
Moses, T.: Extensible access control markup language (xacml) version 2.0. Oasis Standard 200502 (2005)
Chase, M.: Multi-authority attribute based encryption. In: TCC 07 (Lecture Notes in Computer Science), Amsterdam, The Netherlands (2007)
Li, M., Yu, S., Ren, K., Lou, W.: Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Proceedings of Security and Privacy in Communication Networks. Springer, Heidelberg (2010)
Chase, M., Chow, S.: Improving privacy and security in multi-authority attribute-based encryption. In: ACM CCS 09, Chicago, IL, USA (2009)
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: EUROCRYPT 98, Espoo, Finland (1998)
Li, Q., Xiong, H., Zhang, F., Zeng, S.: An expressive decentralizing kp-abe scheme with constant-size ciphertext. Int. J. Netw. Secur. 15(3), 161–170 (2013)
Hohenberger, S., Waters, B.: Attribute-based encryption with fast decryption. In: Public-Key Cryptography PKC 2013. Springer, Heidelberg (2013)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy. IEEE Computer Society (2007)
Chen, C., Zhang, Z., Feng, D.: Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. In: Proceedings of Provable Security. Springer, Heidelberg (2011)
Zhu, Y., Hu, H., Ahn, G., Huang, D., Wang, S.: Towards temporal access control in cloud computing. In: The 2012 IEEE INFOCOM. IEEE (2012)
Zhu, Y., Hu, H., Ahn, G., Yu, M., Zhao, H.: Comparison-based encryption for fine-grained access control in clouds. In: The Second ACM Conference on Data and Application Security and Privacy. ACM (2012)
Zhang, Y., Chen, J.: Access control as a service for public cloud storage. In: Distributed Computing Systems Workshops (ICDCSW). IEEE (2012)
Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Applied Cryptography and Network Security. Springer, Heidelberg (2008)
Doshi, N., Jinwala, D.: Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext. In: Advanced Computing, Networking and Security. Springer, Heidelberg (2012)
Qian, H., Li, J., Zhang, Y.: Privacy-preserving decentralized ciphertext-policy attribute-based encryption with fully hidden access structure. In: Information and Communications Security. Springer (2013)
Jung, T., Li, X., Wan, Z., Wan, M.: Privacy preserving cloud data access with multi-authorities. In: The 2013 IEEE INFOCOM. IEEE (2013)
Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)
Yang, K., Jia, X., Ren, K., Zhang, B.: Dac-macs: effective data access control for multi-authority cloud storage systems. In: The 2013 IEEE INFOCOM. IEEE (2013)
Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: The 17th ACM Conference on Computer and Communications Security. ACM (2010)
Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 320–331 (2011)
Wang, G., Liu, Q., Wu, J.: Achieving finegrained access control for secure data sharing on cloud servers. Concurr. Comput. Pract. Exp. 23(12), 1443–1464 (2011)
Wan, Z., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743–754 (2012)
Chen, Y., Chu, C., Tzeng, W., Zhou, J.: Cloudhka: A cryptographic approach for hierarchical access control in cloud computing. In: Applied Cryptography and Network Security. Springer, Heidelberg (2013)
Wang, G., Liu, Q., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258, 355–370 (2014)
Wikipedia: Role-based access control (2014). http://en.wikipedia.org/wiki/Role-based_access_control
Ferrara, A.L., Madhusudan, P., Parlato, G.: Policy analysis for self-administrated role-based access control. In: Tools and Algorithms for the Construction and Analysis of Systems. Springer, Heidelberg (2013)
Zhou, L., Varadharajan, V., Hitchens, M.: Enforcing role-based access control for secure data storage in the cloud. Comput. J. 54(10), 1675–1687 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Abo-alian, A., Badr, N.L., Tolba, M.F. (2017). Data Storage Security Service in Cloud Computing: Challenges and Solutions. In: Hassanien, A., Mostafa Fouad, M., Manaf, A., Zamani, M., Ahmad, R., Kacprzyk, J. (eds) Multimedia Forensics and Security. Intelligent Systems Reference Library, vol 115. Springer, Cham. https://doi.org/10.1007/978-3-319-44270-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-44270-9_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44268-6
Online ISBN: 978-3-319-44270-9
eBook Packages: EngineeringEngineering (R0)