The design of a redundant array of independent net-storages for improved confidentiality in cloud computing

被引:9
作者
Jaatun, Martin Gilje [1 ]
Zhao, Gansen [2 ]
Vasilakos, Athanasios V. [3 ]
Nyre, Asmund Ahlmann [1 ]
Alapnes, Stian [4 ]
Tang, Yong [2 ]
机构
[1] SINTEF ICT, Trondheim, Norway
[2] South China Normal Univ, Guangzhou, Peoples R China
[3] Univ Western Macedonia, Florina, Greece
[4] Telenor Res & Future Studies, Trondheim, Norway
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2012年 / 1卷 / 01期
关键词
D O I
10.1186/2192-113X-1-13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article describes how a Redundant Array of Independent Net-storages (RAIN) can be deployed for confidentiality control in Cloud Computing. The RAIN approach splits data into segments and distributes segments between multiple storage providers; by keeping the distribution of segments and the relationships between the distributed segments private, the original data cannot be re-assembled by an observer. As long as each segment is small enough, an individual segment discloses no meaningful information to others, and hence RAIN is able to ensure the confidentiality of data stored in the clouds. We describe the inter-cloud communication protocol, and present a formal model, security analysis, and simulation results.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 41 条
[1]   Prudent engineering practice for cryptographic protocols [J].
Abadi, M ;
Needham, R .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (01) :6-15
[2]  
Abu-Libdeh II., 2010, P 1 ACM S CLOUD COMP, P229
[3]   Cloud Agency: A Mobile Agent Based Cloud System [J].
Aversa, Rocco ;
Di Martino, Beniamino ;
Rak, Massimiliano ;
Venticinque, Salvatore .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2010), 2010, :132-137
[4]  
Bogdanov D, 2008, 2008289 CRYPT EPRINT
[5]   Mobile agent security [J].
Borselius, N .
ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL, 2002, 14 (05) :211-218
[6]  
Chaum D., 1988, Journal of Cryptology, V1, P65, DOI 10.1007/BF00206326
[7]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88
[8]  
Chen A., 2010, GCREEP GOOGLE ENG ST
[9]  
Chen Y., 2010, UCBEECS20105
[10]  
Cremers C.J.F., 2006, SCYTHER SEMANTICS VE