JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Improving Data Availability by Data Partitioning and Partial Overlapping on Multiple Cloud Storages
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Improving Data Availability by Data Partitioning and Partial Overlapping on Multiple Cloud Storages
Park, Jun-Cheol;
  PDF(new window)
 Abstract
A cloud service customer has no other way but to wait for his lost data to be recovered by the cloud service provider when the data was lost or not accessible for a while due to the provider's system failure, cracking attempt, malfunction, or outage. We consider a solution to address this problem that can be implemented in the cloud client's domain, rather than in the cloud service provider's domain. We propose a high level architecture and scheme for successfully retrieving data units even when several cloud storages are not accessible at the same time. The scheme is based on a clever way of partitioning and partial overlapping of data for being stored on multiple cloud storages. In addition to providing a high level of data availability, the scheme makes it possible to re-encrypt data units with new keys in a user transparent way, and can produce the complete log of every user's data units accessed, for assessing data disclosure, if needed.
 Keywords
클라우드 스토리지;데이터 가용성;데이터 분할;데이터 부분 중복;보안;
 Language
Korean
 Cited by
1.
안전한 휴대 저장장치로서의 스마트카드를 활용한 (ID, 패스워드) 쌍들의 안전한 저장 및 검색 기법,박준철;

한국통신학회논문지, 2014. vol.39B. 6, pp.333-340 crossref(new window)
2.
Griesmer 한계식을 만족하는 [2k-1+k, k, 2k-1+1] 부호 설계 및 부분접속수 분석,김정현;남미영;박기현;송홍엽;

한국통신학회논문지, 2015. vol.40. 3, pp.491-496 crossref(new window)
3.
두 개의 다른 부분접속수 요건을 가진 부분접속 복구 부호,김건우;이정우;

한국통신학회논문지, 2016. vol.41. 12, pp.1671-1683 crossref(new window)
 References
1.
D. Terry(Ed), ACM Tech Pack on Cloud Computing, http://techpack.acm.org/cloud/, 2010.

2.
B. Hayes, "Cloud Computing", Communications of the ACM, 51(7), pp. 9-11, July 2008.

3.
M. Creeger(Moderator), "Cloud Computing: An Overview", ACM Queue, 7(5), pp. 1-5, June 2009.

4.
S. Kamara, K. Lauter, "Cryptographic Cloud Storage", in Proc. of the 14th Int'l Conf. on Financial Cryptography and Data Security (FC '10), 2010.

5.
M. Mowbray, S. Pearson, "A Client-Based Privacy Manager for Cloud Computing", in Proc. of the 4th Int'l ICST Conf. on Communication System Software and Middleware(COMSWARE '09), 2009.

6.
J. Bardin et al., "Security Guidance for Critical Areas of Focus in Cloud Computing", Technical Report, Cloud Security Alliance, April 2009.

7.
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, J. Molina, "Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control", in Proc. of 2009 ACM Workshop on Cloud Computing Security(CCSW '09), 2009.

8.
C. Cachin, I. Keidar, A. Shraer, "Trusting the Cloud", ACM SIGACT News, 40(2), pp. 81-86, June 2009. crossref(new window)

9.
D.J. Abadi, "Data Management in the Cloud: Limitations and Opportunities", IEEE DE Bulletin, 32(1), pp. 3-12, 2009.

10.
L.C. Voicu, H. Schuldt, "How Replicated Data Management in the Cloud can benefit from a Data Grid Protocol - The Re:GRIDiT Approach", in Proc. of the 1st Int'l Workshop on Cloud Data Management(CloudDB '09), 2009.

11.
http://blogs.wsj.com/digits/2009/03/08/1214/

12.
http://blogs.sun.com/gbrunett/entry/amazon_s3_ silent_data_corruption

13.
http://blogs.zdnet.com/projectfailures/?p=999

14.
http://www.computerworld.com/action/article. do?command=viewArticleBasic&articleId= 9130682&source=NLT_PM

15.
http://www.computerworld.com/action/article.d o?command=viewArticleBasic&articleId=9117 322

16.
http://status.aws.amazon.com/s3-20080720.html

17.
http://www.thewhir.com/web-hosting-news/103