scispace - formally typeset

Cloud storage

About: Cloud storage is a(n) research topic. Over the lifetime, 10699 publication(s) have been published within this topic receiving 113122 citation(s). more


Book ChapterDOI: 10.1007/978-3-642-14992-4_13
Seny Kamara1, Kristin E. Lauter1Institutions (1)
25 Jan 2010-
Abstract: We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer We describe, at a high level, several architectures that combine recent and non-standard cryptographic primitives in order to achieve our goal We survey the benefits such an architecture would provide to both customers and service providers and give an overview of recent advances in cryptography motivated specifically by cloud storage more

Topics: Cloud storage (68%), Client-side encryption (63%), Cloud computing (62%) more

1,271 Citations

Proceedings ArticleDOI: 10.1109/PERCOMW.2017.7917634
13 Mar 2017-
Abstract: Internet of Things (IoT) security and privacy remain a major challenge, mainly due to the massive scale and distributed nature of IoT networks. Blockchain-based approaches provide decentralized security and privacy, yet they involve significant energy, delay, and computational overhead that is not suitable for most resource-constrained IoT devices. In our previous work, we presented a lightweight instantiation of a BC particularly geared for use in IoT by eliminating the Proof of Work (POW) and the concept of coins. Our approach was exemplified in a smart home setting and consists of three main tiers namely: cloud storage, overlay, and smart home. In this paper we delve deeper and outline the various core components and functions of the smart home tier. Each smart home is equipped with an always online, high resource device, known as “miner” that is responsible for handling all communication within and external to the home. The miner also preserves a private and secure BC, used for controlling and auditing communications. We show that our proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability. Finally, we present simulation results to highlight that the overheads (in terms of traffic, processing time and energy consumption) introduced by our approach are insignificant relative to its security and privacy gains. more

Topics: Cloud computing security (60%), Information privacy (59%), Home automation (53%) more

995 Citations

Open accessJournal ArticleDOI: 10.1109/TC.2011.245
Cong Wang1, Sherman S. M. Chow2, Qian Wang3, Kui Ren4  +1 moreInstitutions (4)
Abstract: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities toward user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient. Our preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. more

  • Fig. 1: The architecture of cloud data storage service
    Fig. 1: The architecture of cloud data storage service
  • Fig. 2: The privacy-preserving public auditing protocol
    Fig. 2: The privacy-preserving public auditing protocol
  • Fig. 3: The batch auditing protocol
    Fig. 3: The batch auditing protocol
  • TABLE 1: Notation of cryptographic operations.
    TABLE 1: Notation of cryptographic operations.
  • TABLE 2: Performance under different number of sampled blocks c for high assurance (≥ 95%) auditing.
    TABLE 2: Performance under different number of sampled blocks c for high assurance (≥ 95%) auditing.
  • + 2

Topics: Cloud storage (67%), Cloud computing (64%), Data integrity (56%) more

956 Citations

31 Mar 2010-
Abstract: Systems and methods are disclosed for performing data storage operations, including content-indexing, containerized deduplication, and policy-driven storage, within a cloud environment The systems support a variety of clients and cloud storage sites that may connect to the system in a cloud environment that requires data transfer over wide area networks, such as the Internet, which may have appreciable latency and/or packet loss, using various network protocols, including HTTP and FTP Methods are disclosed for content indexing data stored within a cloud environment to facilitate later searching, including collaborative searching Methods are also disclosed for performing containerized deduplication to reduce the strain on a system namespace, effectuate cost savings, etc Methods are disclosed for identifying suitable storage locations, including suitable cloud storage sites, for data files subject to a storage policy Further, systems and methods for providing a cloud gateway and a scalable data object store within a cloud environment are disclosed, along with other features more

Topics: Cloud storage (72%), Cloud computing (62%), Converged storage (62%) more

849 Citations

Proceedings ArticleDOI: 10.1145/2043556.2043571
Brad Calder1, Ju Wang1, Aaron W. Ogus1, Niranjan Nilakantan1  +23 moreInstitutions (1)
23 Oct 2011-
Abstract: Windows Azure Storage (WAS) is a cloud storage system that provides customers the ability to store seemingly limitless amounts of data for any duration of time. WAS customers have access to their data from anywhere at any time and only pay for what they use and store. In WAS, data is stored durably using both local and geographic replication to facilitate disaster recovery. Currently, WAS storage comes in the form of Blobs (files), Tables (structured storage), and Queues (message delivery). In this paper, we describe the WAS architecture, global namespace, and data model, as well as its resource provisioning, load balancing, and replication systems. more

Topics: Cloud storage (67%), Converged storage (63%), Storage area network (59%) more

803 Citations

No. of papers in the topic in previous years

Top Attributes

Show by:

Topic's top 5 most impactful authors

Willy Susilo

25 papers, 1.1K citations

Kim-Kwang Raymond Choo

23 papers, 1K citations

Jianfeng Ma

14 papers, 175 citations

Robert H. Deng

13 papers, 433 citations

Jia Yu

13 papers, 570 citations

Network Information
Related Topics (5)
Utility computing

11.4K papers, 316.5K citations

90% related
Intrusion detection system

28.4K papers, 509.5K citations

90% related
Cloud computing security

27.1K papers, 511.8K citations

90% related

74.7K papers, 867.1K citations

89% related

98.3K papers, 1.4M citations

89% related