TY - GEN
T1 - ADEC
T2 - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012
AU - Tezuka, Shin
AU - Uda, Ryuya
AU - Okada, Kenichi
PY - 2012/5/14
Y1 - 2012/5/14
N2 - Although cloud storage offers a number of attractive features, it also raises various security concerns. In particular, cloud storage of sensitive information, such as medical or trade records, requires measures to be taken not only for privacy protection, but also for assured deletion and verifiable version control. Even though there are methods for realizing both assured deletion and version control in cloud storage, they cannot guarantee the integrity of files and their versioning order. Therefore, we propose a system referred to as "Assured Deletion and verifiable version Control (ADEC)", which is implemented as a virtual file system capable of taking snapshots in cloud storage. The main ideas behind ADEC are a scheme for generating chained keys and a scheme for verifiable version control with hysteresis signatures. This method can be used not only for protection of privacy, but also for assured deletion of specific versions and all older versions in a single operation. In addition, the integrity of each file version can be verified with the hysteresis signature scheme, which makes it impossible to implement rollback and reordering attacks.
AB - Although cloud storage offers a number of attractive features, it also raises various security concerns. In particular, cloud storage of sensitive information, such as medical or trade records, requires measures to be taken not only for privacy protection, but also for assured deletion and verifiable version control. Even though there are methods for realizing both assured deletion and version control in cloud storage, they cannot guarantee the integrity of files and their versioning order. Therefore, we propose a system referred to as "Assured Deletion and verifiable version Control (ADEC)", which is implemented as a virtual file system capable of taking snapshots in cloud storage. The main ideas behind ADEC are a scheme for generating chained keys and a scheme for verifiable version control with hysteresis signatures. This method can be used not only for protection of privacy, but also for assured deletion of specific versions and all older versions in a single operation. In addition, the integrity of each file version can be verified with the hysteresis signature scheme, which makes it impossible to implement rollback and reordering attacks.
KW - IaaS
KW - assured deletion
KW - cloud storage
KW - hysteresis signature
KW - version control
UR - http://www.scopus.com/inward/record.url?scp=84860721057&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84860721057&partnerID=8YFLogxK
U2 - 10.1109/AINA.2012.116
DO - 10.1109/AINA.2012.116
M3 - Conference contribution
AN - SCOPUS:84860721057
SN - 9780769546513
T3 - Proceedings - International Conference on Advanced Information Networking and Applications, AINA
SP - 23
EP - 30
BT - Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012
Y2 - 26 March 2012 through 29 March 2012
ER -