
A Study Off-Site Disaster Recovery Performance of Cloud Data
ZHOU Hong-cheng, YANG Chao, MA Jian-feng, ZHANG Jun-wei
ACTA ELECTRONICA SINICA ›› 2016, Vol. 44 ›› Issue (10) : 2485-2494.
A Study Off-Site Disaster Recovery Performance of Cloud Data
Implementation of file fault tolerance is the key to preventing data loss in cloud,especially the off-site disaster recovery,which can prevent large-scale power outage and natural disaster occurs from losing data.Currently disaster recovery guarantees for multi-cloud-based storage service provider agreement.To solve these problems,we propose a remote disaster recovery capability for cloud data to validate the program——DPBDL,whose theory is to use time delay and the proofs of retrievability to check the off-site data recovery of cloud data.Then,we analysis its security and performance theoretically and practically,and the analysis result shows that its security and be able to accurately determine the cloud data off-site disaster recovery capabilities.
cloud storage / off-site disaster recovery / data integrity verification {{custom_keyword}} /
[1] Juels A,Kaliski Jr B S.PORs:Proofs of retrievability for large files[A].Proceedings of the 14th ACM Conference on Computer and Communications Security[C].USA:ACM,2007.584-597.
[2] Erway C,Küp?ü A,Papamanthou C,et al.Dynamic provable data possession[A].Proceedings of the 16th ACM Conference on Computer and Communications Security[C].USA:ACM,2009.213-222.
[3] Bowers K D,van Dijk M,Juels A,et al.How to tell if your cloud files are vulnerable to drive crashes[A].Proceedings of the 18th ACM Conference on Computer and Communications Security[C].USA:ACM,2011.501-514.
[4] Benson K,Dowsley R,Shacham H.Do you know where your cloud files are?[A].Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop[C].USA:ACM,2011.73-82.
[5] Watson G J,Safavi-Naini R,Alimomeni M,et al.LoSt:location based storage[A].Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop[C].USA:ACM,2012.59-70.
[6] Gondree M,Peterson Z N J.Geolocation of data in the cloud[A].Proceedings of the Third ACM Conference on Data and Application Security and Privacy[C].USA:ACM,2013.25-36.
[7] Wang Z,Sun K,Jajodia S,et al.Disk storage isolation and verification in cloud[A].IEEE Global Communications Conference (GLOBECOM)[C].USA:IEEE,2012.771-776.
[8] Wang Z,Sun K,Jing J,et al.Verification of data redundancy in cloud storage[A].Proceedings of the 2013 International Workshop on Security in Cloud Computing[C].USA:ACM,2013.11-18.
[9] Wang Z,Sun K,Jajodia S,et al.Terracheck:Verification of dedicated cloud storage[A].Data and Applications Security and Privacy XXVII[M].Berlin Heidelberg:Springer,2013.113-127.
[10] Noman A,Adams C.Providing a data location assurance service for cloud storage environments[J].Journal of Mobile Multimedia,2012,8(4):265-286.
[11] Albeshri A,Boyd C,Nieto J G.Geoproof:proofs of geographic location for cloud computing environment[A].Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW)[C].USA:IEEE,2012.506-514.
[12] Albeshri A,Boyd C,Nieto J G.Enhanced GeoProof:improved geographic assurance for data in the cloud[J].International Journal of Information Security,2014,13(2):191-198.
[13] Chen B,Curtmola R.Towards self-repairing replication-based storage systems using untrusted clouds[A].Proceedings of the Third ACM Conference on Data and Application Security and Privacy[C].USA:ACM,2013.377-388.
[14] BOWERS K D,JUELS A,OPREA A.HAIL:Ahigt-aviailability and integrity layer for cloud storage[A].Proceedings of the 16th ACM Conference on Computer and Communications Security[C].USA:ACM,2009.67-76.
[15] 周恩光,李舟军,郭华,贾仰理.一个改进的云存储数据完整性验证方案[J].电子学报,2014,42 (1):150-154. ZHOU En-guang,LI Zhou-jun,GUO Hua,JIA Yang-li.An improved data integrity verification scheme in cloud storage system[J].Acta Electronica Sinica,2014,42 (1):150-154.(in Chinese)
[16] 王丽娜,任正伟,余荣威,韩凤,董永峰.一种适于云存储的数据确定性删除方法[J].电子学报,2012,40(2):266-272. WANG Li-na,REN Zheng-wei,YU Rong-wei,HAN Feng,DONG Yong-feng.A data assured deletion approach adapted for cloud storage[J].Acta Electronica Sinica,2012,40(2):266-272.(in Chinese)
[17] 沈钢,魏震,蔡云泽,许晓鸣,何星,张卫东.一种实时以太网介质访问控制协议的时延性能分析[J].电子学报,2003,31(2):175-179. SHEN Gang,WEI Zhen,CAI Yun-ze,XU Xiao-ming,HE Xing,ZHANG Wei-dong.Delivery delay analysis of a real-time ethernet MAC protocol[J].Acta Electronica Sinica,2003,31(2):175-179.(in Chinese)
[18] Shacham H,Waters B.Compact proofs of retrievability[A].Advances in Cryptology-ASIACRYPT[M].Berlin Heidelberg:Springer,2008.90-107.
[19] Curtmola R,Khan O,Burns R,et al.MR-PDP:Multiple-replica provable data possession[A].Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS'08)[C].USA:IEEE,2008.411-420.
[20] 李超零,陈越,谭鹏许,杨刚.基于同态 hash 的数据多副本持有性证明方案[J].计算机应用研究,2013,30(1):265-269. Li Chao-ling,Chen Yue,Tan Peng-xu,Yang Gang.Multiple-replica provable data possession based on homomorphic hash[J].Application Research of Computers,2013,30(1):265-269.(in Chinese)
[21] Yang C,Ren J,Ma J.Provable ownership of file in de-duplication cloud storage[A].Proceedings of Global Communications Conference (GLOBECOM)[C].USA:IEEE,2013.695-700.
[22] Erway C,Kupcu A,Papamanthou C,et al.Dynamic provable data possession[A].Proceedings of the 16th ACM Conference on Computer and Communications Security[C].USA:ACM,2009.213-222.
[23] 李超零,陈越,谭鹏许,杨刚.一种高效的动态数据持有性证明方案[J].小型微型计算机系统,2013,34(11):2461-2466. LI Chao-ling,CHEN Yue,TAN Peng-xu,LI Min,YANG Gang.An efficient provable data possession scheme with data dynamics[J].Journal of Chinese Computer Systems,2013,34(11):2461-2466.(in Chinese)
[24] 胡德敏,余星.一种基于同态标签的动态云存储数据完整性验证方法[J].计算机应用研究,2014,31(5):1362-1365,1395. HU De-min,YU Xing.Dynamic cloud storage data integrity verifying method based on homomorphic tags[J].Application Research of Computers,2014,31(5):1362-1365,1395.(in Chinese)
/
〈 |
|
〉 |