TY - GEN
T1 - Security and efficiency trade-offs for cloud computing and storage
AU - Li, Jian
AU - Zhou, Kai
AU - Ren, Jian
N1 - Publisher Copyright:
© 2015 IEEE.
Copyright:
Copyright 2017 Elsevier B.V., All rights reserved.
PY - 2015/10/1
Y1 - 2015/10/1
N2 - Cloud computing provides centralized data storage and online computing. For centralized data storage, to address both security and availability issue, distributed storage is an appealing option in that it can ensure file security without requiring data encryption. Instead of storing a file and its replications on multiple servers, we can break the file into components and store the components on multiple servers. In this paper, we develop the minimum storage regeneration (MSR) point based distributed storage schemes that can achieve optimal storage efficiency and storage capacity. Moreover, our scheme can detect and correct malicious nodes with much higher error correction efficiency. For online computing, we investigate outsourcing of general computational problems and propose efficient Cost-Aware Secure Outsourcing (CASO) schemes for problem transformation and outsourcing so that the cloud is unable to learn any key information from the transformed problem. We also propose a verification scheme to ensure that the end-users will always receive a valid solution from the cloud. Our extensive complexity and security analysis show that our proposed Cost-Aware Secure Outsourcing (CASO) scheme is both practical and effective.
AB - Cloud computing provides centralized data storage and online computing. For centralized data storage, to address both security and availability issue, distributed storage is an appealing option in that it can ensure file security without requiring data encryption. Instead of storing a file and its replications on multiple servers, we can break the file into components and store the components on multiple servers. In this paper, we develop the minimum storage regeneration (MSR) point based distributed storage schemes that can achieve optimal storage efficiency and storage capacity. Moreover, our scheme can detect and correct malicious nodes with much higher error correction efficiency. For online computing, we investigate outsourcing of general computational problems and propose efficient Cost-Aware Secure Outsourcing (CASO) schemes for problem transformation and outsourcing so that the cloud is unable to learn any key information from the transformed problem. We also propose a verification scheme to ensure that the end-users will always receive a valid solution from the cloud. Our extensive complexity and security analysis show that our proposed Cost-Aware Secure Outsourcing (CASO) scheme is both practical and effective.
KW - Cloud computing
KW - computation outsourcing
KW - costaware
KW - distributed storage
KW - efficiency
KW - optimal scheme design
KW - security
UR - http://www.scopus.com/inward/record.url?scp=84961626541&partnerID=8YFLogxK
U2 - 10.1109/RWEEK.2015.7287434
DO - 10.1109/RWEEK.2015.7287434
M3 - Conference article published in proceeding or book
AN - SCOPUS:84961626541
T3 - Proceedings - 2015 Resilience Week, RSW 2015
SP - 148
EP - 153
BT - Proceedings - 2015 Resilience Week, RSW 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - Resilience Week, RSW 2015
Y2 - 18 August 2015 through 20 August 2015
ER -