Resilient cloud data storage services

Hemayamini Kurra, Youssif Al-Nashif, Salim A Hariri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

With the advance of cloud computing technologies, there is a huge demand for computing resources and storage. Many organizations prefer to outsource their storage and other resources. As the data reside on the third parties data centers, security is becoming a major concern. In this paper we propose a Resilient Cloud Storage (RCS) architecture that addresses the major security issues for cloud storage such as access control confidentiality, integrity, and secure communications. Our resilient approach is based on moving target defense and key hopping techniques. Data is partitioned into a random number of partitions where different keys are used to encrypt each partition. We also show that by using key hopping technique, we can reduce smaller key length that is normally used to improve performance without compromising the security. Our experimental results show that we can improve performance by 50% when we use a key of length 512 when compared with certificate technique that uses key length of 2048.

Original languageEnglish (US)
Title of host publicationACM International Conference Proceeding Series
DOIs
StatePublished - 2013
Event2013 ACM International Conference on Cloud and Autonomic Computing, CAC 2013 - Miami, FL, United States
Duration: Aug 5 2013Aug 9 2013

Other

Other2013 ACM International Conference on Cloud and Autonomic Computing, CAC 2013
CountryUnited States
CityMiami, FL
Period8/5/138/9/13

Fingerprint

Cloud computing
Access control
Data storage equipment
Secure communication

Keywords

  • cloud computing
  • cloud storage
  • decryption
  • encryption
  • resilience

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Cite this

Kurra, H., Al-Nashif, Y., & Hariri, S. A. (2013). Resilient cloud data storage services. In ACM International Conference Proceeding Series https://doi.org/10.1145/2494621.2494634

Resilient cloud data storage services. / Kurra, Hemayamini; Al-Nashif, Youssif; Hariri, Salim A.

ACM International Conference Proceeding Series. 2013.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kurra, H, Al-Nashif, Y & Hariri, SA 2013, Resilient cloud data storage services. in ACM International Conference Proceeding Series. 2013 ACM International Conference on Cloud and Autonomic Computing, CAC 2013, Miami, FL, United States, 8/5/13. https://doi.org/10.1145/2494621.2494634
Kurra H, Al-Nashif Y, Hariri SA. Resilient cloud data storage services. In ACM International Conference Proceeding Series. 2013 https://doi.org/10.1145/2494621.2494634
Kurra, Hemayamini ; Al-Nashif, Youssif ; Hariri, Salim A. / Resilient cloud data storage services. ACM International Conference Proceeding Series. 2013.
@inproceedings{cc062acd6b644b0c83cccff2e53f85f3,
title = "Resilient cloud data storage services",
abstract = "With the advance of cloud computing technologies, there is a huge demand for computing resources and storage. Many organizations prefer to outsource their storage and other resources. As the data reside on the third parties data centers, security is becoming a major concern. In this paper we propose a Resilient Cloud Storage (RCS) architecture that addresses the major security issues for cloud storage such as access control confidentiality, integrity, and secure communications. Our resilient approach is based on moving target defense and key hopping techniques. Data is partitioned into a random number of partitions where different keys are used to encrypt each partition. We also show that by using key hopping technique, we can reduce smaller key length that is normally used to improve performance without compromising the security. Our experimental results show that we can improve performance by 50{\%} when we use a key of length 512 when compared with certificate technique that uses key length of 2048.",
keywords = "cloud computing, cloud storage, decryption, encryption, resilience",
author = "Hemayamini Kurra and Youssif Al-Nashif and Hariri, {Salim A}",
year = "2013",
doi = "10.1145/2494621.2494634",
language = "English (US)",
isbn = "9781450321723",
booktitle = "ACM International Conference Proceeding Series",

}

TY - GEN

T1 - Resilient cloud data storage services

AU - Kurra, Hemayamini

AU - Al-Nashif, Youssif

AU - Hariri, Salim A

PY - 2013

Y1 - 2013

N2 - With the advance of cloud computing technologies, there is a huge demand for computing resources and storage. Many organizations prefer to outsource their storage and other resources. As the data reside on the third parties data centers, security is becoming a major concern. In this paper we propose a Resilient Cloud Storage (RCS) architecture that addresses the major security issues for cloud storage such as access control confidentiality, integrity, and secure communications. Our resilient approach is based on moving target defense and key hopping techniques. Data is partitioned into a random number of partitions where different keys are used to encrypt each partition. We also show that by using key hopping technique, we can reduce smaller key length that is normally used to improve performance without compromising the security. Our experimental results show that we can improve performance by 50% when we use a key of length 512 when compared with certificate technique that uses key length of 2048.

AB - With the advance of cloud computing technologies, there is a huge demand for computing resources and storage. Many organizations prefer to outsource their storage and other resources. As the data reside on the third parties data centers, security is becoming a major concern. In this paper we propose a Resilient Cloud Storage (RCS) architecture that addresses the major security issues for cloud storage such as access control confidentiality, integrity, and secure communications. Our resilient approach is based on moving target defense and key hopping techniques. Data is partitioned into a random number of partitions where different keys are used to encrypt each partition. We also show that by using key hopping technique, we can reduce smaller key length that is normally used to improve performance without compromising the security. Our experimental results show that we can improve performance by 50% when we use a key of length 512 when compared with certificate technique that uses key length of 2048.

KW - cloud computing

KW - cloud storage

KW - decryption

KW - encryption

KW - resilience

UR - http://www.scopus.com/inward/record.url?scp=84883675197&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84883675197&partnerID=8YFLogxK

U2 - 10.1145/2494621.2494634

DO - 10.1145/2494621.2494634

M3 - Conference contribution

AN - SCOPUS:84883675197

SN - 9781450321723

BT - ACM International Conference Proceeding Series

ER -