Cloud Storage File Recoverability. / Gorke, Christian; Janson, Christian; Armknecht, Frederik; Cid, Carlos.

SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing. New York, NY, USA : ACM, 2017. p. 19-26.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Cloud Storage File Recoverability. / Gorke, Christian; Janson, Christian; Armknecht, Frederik; Cid, Carlos.

SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing. New York, NY, USA : ACM, 2017. p. 19-26.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Gorke, C, Janson, C, Armknecht, F & Cid, C 2017, Cloud Storage File Recoverability. in SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing. ACM, New York, NY, USA, pp. 19-26, The Fifth International Workshop on Security in Cloud Computing, Abu Dhabi, United Arab Emirates, 2/04/17. https://doi.org/10.1145/3055259.3055264

APA

Gorke, C., Janson, C., Armknecht, F., & Cid, C. (2017). Cloud Storage File Recoverability. In SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing (pp. 19-26). ACM. https://doi.org/10.1145/3055259.3055264

Vancouver

Gorke C, Janson C, Armknecht F, Cid C. Cloud Storage File Recoverability. In SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing. New York, NY, USA: ACM. 2017. p. 19-26 https://doi.org/10.1145/3055259.3055264

Author

Gorke, Christian ; Janson, Christian ; Armknecht, Frederik ; Cid, Carlos. / Cloud Storage File Recoverability. SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing. New York, NY, USA : ACM, 2017. pp. 19-26

BibTeX

@inproceedings{8e1fbbac18774e56a68400054e642709,
title = "Cloud Storage File Recoverability",
abstract = "Data loss is perceived as one of the major threats for cloud storage. Consequently, the security community developed several challenge-response protocols that allow a user to remotely verify whether an outsourced file is still intact. However, two important practical problems have not yet been considered. First, clients commonly outsource multiple files of different sizes, raising the question how to formalise such a scheme and in particular ensuring that all files can be simultaneously audited. Second, in case auditing of the files fails, existing schemes do not provide a client with any method to prove if the original files are still recoverable.We address both problems and describe appropriate solutions. The first problem is tackled by providing a new type of “Proofs of Retrievability” scheme, enabling a client to check all files simultaneously in a compact way. The second problem is solved by defining a novel procedure called “Proofs of Recoverability”, enabling a client to obtain an assurance whether a file is recoverable or irreparably damaged. Finally, we present a combination of both schemes allowing the client to check the recoverability of all her original files, thus ensuring cloud storage file recoverability.",
author = "Christian Gorke and Christian Janson and Frederik Armknecht and Carlos Cid",
year = "2017",
month = apr,
day = "2",
doi = "10.1145/3055259.3055264",
language = "English",
pages = "19--26",
booktitle = "SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing",
publisher = "ACM",
note = "The Fifth International Workshop on Security in Cloud Computing, AsiaCCS - SCC 2017 ; Conference date: 02-04-2017 Through 02-04-2017",
url = "https://conference.cs.cityu.edu.hk/asiaccsscc/",

}

RIS

TY - GEN

T1 - Cloud Storage File Recoverability

AU - Gorke, Christian

AU - Janson, Christian

AU - Armknecht, Frederik

AU - Cid, Carlos

PY - 2017/4/2

Y1 - 2017/4/2

N2 - Data loss is perceived as one of the major threats for cloud storage. Consequently, the security community developed several challenge-response protocols that allow a user to remotely verify whether an outsourced file is still intact. However, two important practical problems have not yet been considered. First, clients commonly outsource multiple files of different sizes, raising the question how to formalise such a scheme and in particular ensuring that all files can be simultaneously audited. Second, in case auditing of the files fails, existing schemes do not provide a client with any method to prove if the original files are still recoverable.We address both problems and describe appropriate solutions. The first problem is tackled by providing a new type of “Proofs of Retrievability” scheme, enabling a client to check all files simultaneously in a compact way. The second problem is solved by defining a novel procedure called “Proofs of Recoverability”, enabling a client to obtain an assurance whether a file is recoverable or irreparably damaged. Finally, we present a combination of both schemes allowing the client to check the recoverability of all her original files, thus ensuring cloud storage file recoverability.

AB - Data loss is perceived as one of the major threats for cloud storage. Consequently, the security community developed several challenge-response protocols that allow a user to remotely verify whether an outsourced file is still intact. However, two important practical problems have not yet been considered. First, clients commonly outsource multiple files of different sizes, raising the question how to formalise such a scheme and in particular ensuring that all files can be simultaneously audited. Second, in case auditing of the files fails, existing schemes do not provide a client with any method to prove if the original files are still recoverable.We address both problems and describe appropriate solutions. The first problem is tackled by providing a new type of “Proofs of Retrievability” scheme, enabling a client to check all files simultaneously in a compact way. The second problem is solved by defining a novel procedure called “Proofs of Recoverability”, enabling a client to obtain an assurance whether a file is recoverable or irreparably damaged. Finally, we present a combination of both schemes allowing the client to check the recoverability of all her original files, thus ensuring cloud storage file recoverability.

U2 - 10.1145/3055259.3055264

DO - 10.1145/3055259.3055264

M3 - Conference contribution

SP - 19

EP - 26

BT - SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing

PB - ACM

CY - New York, NY, USA

T2 - The Fifth International Workshop on Security in Cloud Computing

Y2 - 2 April 2017 through 2 April 2017

ER -