Decentralized Cloud Storage (DCS) networks represent an interesting solution for data storage and management. DCS networks rely on the voluntary effort of a considerable number of (possibly untrusted) nodes, which may dynamically join and leave the network at any time. To profitably rely on DCS for data storage, data owners therefore need solutions that guarantee confidentiality and availability of their data. In this paper, we present an approach enabling data owners to keep data confidentiality and availability under control, limiting the owners intervention with corrective actions when availability or confidentiality is at risk. Our approach is based on the combined adoption of AONT (All-Or-Nothing-Transform) and fountain codes. It provides confidentiality of outsourced data also against malicious coalitions of nodes, and guarantees data availability even in case of node failures. Our experimental evaluation clearly shows the benefits of using fountain codes with respect to other approaches adopted by current DCS networks.
Dynamic Allocation for Resource Protection in Decentralized Cloud Storage / E. Bacis, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, M. Rosa, P. Samarati (GLOBECOM). - In: 2019 IEEE Global Communications Conference (GLOBECOM)[s.l] : IEEE, 2019 Dec 09. - ISBN 9781728109633. - pp. 1-6 (( convegno IEEE Global Communications Conference tenutosi a Waikoloa nel 2019 [10.1109/GLOBECOM38437.2019.9013354].
Dynamic Allocation for Resource Protection in Decentralized Cloud Storage
S. De Capitani di Vimercati;S. Foresti;P. Samarati
2019
Abstract
Decentralized Cloud Storage (DCS) networks represent an interesting solution for data storage and management. DCS networks rely on the voluntary effort of a considerable number of (possibly untrusted) nodes, which may dynamically join and leave the network at any time. To profitably rely on DCS for data storage, data owners therefore need solutions that guarantee confidentiality and availability of their data. In this paper, we present an approach enabling data owners to keep data confidentiality and availability under control, limiting the owners intervention with corrective actions when availability or confidentiality is at risk. Our approach is based on the combined adoption of AONT (All-Or-Nothing-Transform) and fountain codes. It provides confidentiality of outsourced data also against malicious coalitions of nodes, and guarantees data availability even in case of node failures. Our experimental evaluation clearly shows the benefits of using fountain codes with respect to other approaches adopted by current DCS networks.File | Dimensione | Formato | |
---|---|---|---|
bdfprs-globecom.pdf
accesso aperto
Tipologia:
Pre-print (manoscritto inviato all'editore)
Dimensione
416.5 kB
Formato
Adobe PDF
|
416.5 kB | Adobe PDF | Visualizza/Apri |
09013354.pdf
accesso riservato
Tipologia:
Publisher's version/PDF
Dimensione
165.15 kB
Formato
Adobe PDF
|
165.15 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.