TY - JOUR
T1 - Lightweight secure storage model with fault-tolerance in cloud environment
AU - Ahmed, Muhra
AU - Vu, Quang Hieu
AU - Asal, Rasool
AU - Al Muhairi, Hassan
AU - Yeun, Chan Yeob
N1 - Publisher Copyright:
© 2014, Springer Science+Business Media New York.
PY - 2014/12/9
Y1 - 2014/12/9
N2 - According to several surveys studied by both cloud computing providers and security solution providers, security concerns, in particular data security, are the main reasons for people’s reluctance to employ cloud computing. In this paper, we address the concern of data security by introducing SECRESO, a SEcure storage model for Cloud data based on REed-SOlomon code. In our proposed model, we enhance Reed-Solomon code with an extra security layer in which a password is always required to reconstruct data from its encoded blocks in the storage. In this way, without a correct password, unauthorized users cannot see the data, and hence the data is secure. Additionally, to support fault tolerance, we also introduce a log based data recovery scheme that allows data recovery without knowing the password. In this way, even though the recovered data can be incorrect, as soon as the password is provided, information from the log can be used to correct the data.
AB - According to several surveys studied by both cloud computing providers and security solution providers, security concerns, in particular data security, are the main reasons for people’s reluctance to employ cloud computing. In this paper, we address the concern of data security by introducing SECRESO, a SEcure storage model for Cloud data based on REed-SOlomon code. In our proposed model, we enhance Reed-Solomon code with an extra security layer in which a password is always required to reconstruct data from its encoded blocks in the storage. In this way, without a correct password, unauthorized users cannot see the data, and hence the data is secure. Additionally, to support fault tolerance, we also introduce a log based data recovery scheme that allows data recovery without knowing the password. In this way, even though the recovered data can be incorrect, as soon as the password is provided, information from the log can be used to correct the data.
KW - Cloud computing
KW - Data security
KW - Erasure code
KW - Reed–Solomon
UR - https://www.scopus.com/pages/publications/84916624493
U2 - 10.1007/s10660-014-9140-9
DO - 10.1007/s10660-014-9140-9
M3 - Article
AN - SCOPUS:84916624493
SN - 1389-5753
VL - 14
SP - 271
EP - 291
JO - Electronic Commerce Research
JF - Electronic Commerce Research
IS - 3
ER -