Untrusted Environment

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 2325 Experts worldwide ranked by ideXlab platform

Guoren Wang - One of the best experts on this subject based on the ideXlab platform.

  • Outsourced data integrity verification based on blockchain in Untrusted Environment
    World Wide Web, 2020
    Co-Authors: Hao Kun, Junchang Xin, Zhiqiong Wang, Guoren Wang
    Abstract:

    Outsourced data, as the significant component of cloud service, has been widely used due to its convenience, low overhead, and high flexibility. To guarantee the integrity of outsourced data, data owner (DO) usually adopts a third party auditor (TPA) to execute the data integrity verification scheme. However, during the verification process, DO cannot fully confirm the reliability of the TPA, and handing over the verification of data integrity to the Untrusted TPA may lead to data security threats. In this paper, we focus on the problem of integrity verification of outsourced data in Untrusted Environment, that is, how to improve the security and efficiency of data integrity verification without utilizing Untrusted TPA. To address the problem, we design a decentralized model based on blockchain consisting of some collaborative verification peers (VPs), each of which maintains a replication of the entire blockchain to avoid maliciously tampering with. Based on the model, we present an advanced data integrity verification algorithm which allows DO to store and check the verification information by writing and retrieving the blockchain. In addition, in order to improve the concurrent performance, we extend the algorithm by introducing the verification group (VG) constituting by some VPs organized by Inner-Group and Inter-Group consensus protocols. We conduct a completed security analysis as well as extensive experiments of our proposed approach, and the evaluation results demonstrate that our proposed approaches achieve superior performance.

  • Blockchain-Based Outsourced Storage Schema in Untrusted Environment
    IEEE Access, 2019
    Co-Authors: Hao Kun, Junchang Xin, Zhiqiong Wang, Keyan Cao, Guoren Wang
    Abstract:

    Outsourced data, as significant service offered by the cloud service provider (CSP), can effectively facilitate the data owner (DO) overcoming the storage limitations on massive data. To ensure the availability of data, DO usually outsources the data replications to multiple CSPs (multi-CSPs) and utilizes a third party metadata management (TPMM) to dominate the metadata of the corresponding replications. However, during the outsourced procedures, DO can hardly confirm the confidence of the TPMM who may take some malicious behaviors to affect the reliability of data. Thus, DO inevitably faces data security issues caused by the over-reliance on the semi-trusted TPMM to manage the metadata of replications. In this paper, we focus on the problem of reliable outsourced data service among multi-CSPs in Untrusted Environment, that is, how to reliably store and verify the metadata of the data replications in Untrusted multi-CSPs Environment. To address the problem, we use the novel blockchain technology as a medium to build a trusted outsourced service platform. Moreover, we fully consider the innovative characteristics of blockchain including decentralized architecture, redundancy storage, collective maintenance, and tamper resistant to ensure the data cannot be changed maliciously. We first design a blockchain-based outsourced service framework for storing data replications in Untrusted Environment, which contains three key layers, that is, storage layer , verification layer , and blockchain layer . Then, we devise a novel concept of verification peer (VP) for maintaining metadata stored by a form of blockchain, and each of which holds the entire blockchain locally to prevent metadata from being maliciously tampered with. Finally, based on the proposed model, we introduce a collaborative algorithm invoked by VPs to store and verify the metadata of replications. We present a completed analysis and conduct extensive experiments on multi-CSPs scenario. The evaluation results demonstrate that our proposed approach achieves superior performance.

  • decentralized data integrity verification model in Untrusted Environment
    Web-Age Information Management, 2018
    Co-Authors: Kun Hao, Junchang Xin, Zhiqiong Wang, Zhuochen Jiang, Guoren Wang
    Abstract:

    Outsourced data, as an significant component of cloud service, has been widely used due to its convince, low overhead and high flexibility. To guarantee the integrity of outsourced data and reduce the computational overhead, data owner (DO) usually adopts a third party auditor (TPA) to execute verification scheme. However, handing over the verification of data to TPA may lead to security vulnerabilities since the TPA is not fully trusted. In this paper, we propose a novel solution for data integrity verification in Untrusted outsourced Environment. Firstly, we design a decentralized model based on blockchain, consisting by some collaborative verification peers (VPs). Based on our purposed model, we present an advanced data integrity verification algorithm, allowing DO stores and checks verification results by writing and retrieving the blockchain. Moreover, each VP maintains a replication of the entire blockchain to avoid maliciously tampering with. We evaluate our proposed approach on real outsourced data service scenario. Experimental results demonstrate that our proposed approach is efficient and effective.

Hao Kun - One of the best experts on this subject based on the ideXlab platform.

  • Outsourced data integrity verification based on blockchain in Untrusted Environment
    World Wide Web, 2020
    Co-Authors: Hao Kun, Junchang Xin, Zhiqiong Wang, Guoren Wang
    Abstract:

    Outsourced data, as the significant component of cloud service, has been widely used due to its convenience, low overhead, and high flexibility. To guarantee the integrity of outsourced data, data owner (DO) usually adopts a third party auditor (TPA) to execute the data integrity verification scheme. However, during the verification process, DO cannot fully confirm the reliability of the TPA, and handing over the verification of data integrity to the Untrusted TPA may lead to data security threats. In this paper, we focus on the problem of integrity verification of outsourced data in Untrusted Environment, that is, how to improve the security and efficiency of data integrity verification without utilizing Untrusted TPA. To address the problem, we design a decentralized model based on blockchain consisting of some collaborative verification peers (VPs), each of which maintains a replication of the entire blockchain to avoid maliciously tampering with. Based on the model, we present an advanced data integrity verification algorithm which allows DO to store and check the verification information by writing and retrieving the blockchain. In addition, in order to improve the concurrent performance, we extend the algorithm by introducing the verification group (VG) constituting by some VPs organized by Inner-Group and Inter-Group consensus protocols. We conduct a completed security analysis as well as extensive experiments of our proposed approach, and the evaluation results demonstrate that our proposed approaches achieve superior performance.

  • Blockchain-Based Outsourced Storage Schema in Untrusted Environment
    IEEE Access, 2019
    Co-Authors: Hao Kun, Junchang Xin, Zhiqiong Wang, Keyan Cao, Guoren Wang
    Abstract:

    Outsourced data, as significant service offered by the cloud service provider (CSP), can effectively facilitate the data owner (DO) overcoming the storage limitations on massive data. To ensure the availability of data, DO usually outsources the data replications to multiple CSPs (multi-CSPs) and utilizes a third party metadata management (TPMM) to dominate the metadata of the corresponding replications. However, during the outsourced procedures, DO can hardly confirm the confidence of the TPMM who may take some malicious behaviors to affect the reliability of data. Thus, DO inevitably faces data security issues caused by the over-reliance on the semi-trusted TPMM to manage the metadata of replications. In this paper, we focus on the problem of reliable outsourced data service among multi-CSPs in Untrusted Environment, that is, how to reliably store and verify the metadata of the data replications in Untrusted multi-CSPs Environment. To address the problem, we use the novel blockchain technology as a medium to build a trusted outsourced service platform. Moreover, we fully consider the innovative characteristics of blockchain including decentralized architecture, redundancy storage, collective maintenance, and tamper resistant to ensure the data cannot be changed maliciously. We first design a blockchain-based outsourced service framework for storing data replications in Untrusted Environment, which contains three key layers, that is, storage layer , verification layer , and blockchain layer . Then, we devise a novel concept of verification peer (VP) for maintaining metadata stored by a form of blockchain, and each of which holds the entire blockchain locally to prevent metadata from being maliciously tampered with. Finally, based on the proposed model, we introduce a collaborative algorithm invoked by VPs to store and verify the metadata of replications. We present a completed analysis and conduct extensive experiments on multi-CSPs scenario. The evaluation results demonstrate that our proposed approach achieves superior performance.

Zhiqiong Wang - One of the best experts on this subject based on the ideXlab platform.

  • Outsourced data integrity verification based on blockchain in Untrusted Environment
    World Wide Web, 2020
    Co-Authors: Hao Kun, Junchang Xin, Zhiqiong Wang, Guoren Wang
    Abstract:

    Outsourced data, as the significant component of cloud service, has been widely used due to its convenience, low overhead, and high flexibility. To guarantee the integrity of outsourced data, data owner (DO) usually adopts a third party auditor (TPA) to execute the data integrity verification scheme. However, during the verification process, DO cannot fully confirm the reliability of the TPA, and handing over the verification of data integrity to the Untrusted TPA may lead to data security threats. In this paper, we focus on the problem of integrity verification of outsourced data in Untrusted Environment, that is, how to improve the security and efficiency of data integrity verification without utilizing Untrusted TPA. To address the problem, we design a decentralized model based on blockchain consisting of some collaborative verification peers (VPs), each of which maintains a replication of the entire blockchain to avoid maliciously tampering with. Based on the model, we present an advanced data integrity verification algorithm which allows DO to store and check the verification information by writing and retrieving the blockchain. In addition, in order to improve the concurrent performance, we extend the algorithm by introducing the verification group (VG) constituting by some VPs organized by Inner-Group and Inter-Group consensus protocols. We conduct a completed security analysis as well as extensive experiments of our proposed approach, and the evaluation results demonstrate that our proposed approaches achieve superior performance.

  • Blockchain-Based Outsourced Storage Schema in Untrusted Environment
    IEEE Access, 2019
    Co-Authors: Hao Kun, Junchang Xin, Zhiqiong Wang, Keyan Cao, Guoren Wang
    Abstract:

    Outsourced data, as significant service offered by the cloud service provider (CSP), can effectively facilitate the data owner (DO) overcoming the storage limitations on massive data. To ensure the availability of data, DO usually outsources the data replications to multiple CSPs (multi-CSPs) and utilizes a third party metadata management (TPMM) to dominate the metadata of the corresponding replications. However, during the outsourced procedures, DO can hardly confirm the confidence of the TPMM who may take some malicious behaviors to affect the reliability of data. Thus, DO inevitably faces data security issues caused by the over-reliance on the semi-trusted TPMM to manage the metadata of replications. In this paper, we focus on the problem of reliable outsourced data service among multi-CSPs in Untrusted Environment, that is, how to reliably store and verify the metadata of the data replications in Untrusted multi-CSPs Environment. To address the problem, we use the novel blockchain technology as a medium to build a trusted outsourced service platform. Moreover, we fully consider the innovative characteristics of blockchain including decentralized architecture, redundancy storage, collective maintenance, and tamper resistant to ensure the data cannot be changed maliciously. We first design a blockchain-based outsourced service framework for storing data replications in Untrusted Environment, which contains three key layers, that is, storage layer , verification layer , and blockchain layer . Then, we devise a novel concept of verification peer (VP) for maintaining metadata stored by a form of blockchain, and each of which holds the entire blockchain locally to prevent metadata from being maliciously tampered with. Finally, based on the proposed model, we introduce a collaborative algorithm invoked by VPs to store and verify the metadata of replications. We present a completed analysis and conduct extensive experiments on multi-CSPs scenario. The evaluation results demonstrate that our proposed approach achieves superior performance.

  • decentralized data integrity verification model in Untrusted Environment
    Web-Age Information Management, 2018
    Co-Authors: Kun Hao, Junchang Xin, Zhiqiong Wang, Zhuochen Jiang, Guoren Wang
    Abstract:

    Outsourced data, as an significant component of cloud service, has been widely used due to its convince, low overhead and high flexibility. To guarantee the integrity of outsourced data and reduce the computational overhead, data owner (DO) usually adopts a third party auditor (TPA) to execute verification scheme. However, handing over the verification of data to TPA may lead to security vulnerabilities since the TPA is not fully trusted. In this paper, we propose a novel solution for data integrity verification in Untrusted outsourced Environment. Firstly, we design a decentralized model based on blockchain, consisting by some collaborative verification peers (VPs). Based on our purposed model, we present an advanced data integrity verification algorithm, allowing DO stores and checks verification results by writing and retrieving the blockchain. Moreover, each VP maintains a replication of the entire blockchain to avoid maliciously tampering with. We evaluate our proposed approach on real outsourced data service scenario. Experimental results demonstrate that our proposed approach is efficient and effective.

Junchang Xin - One of the best experts on this subject based on the ideXlab platform.

  • Outsourced data integrity verification based on blockchain in Untrusted Environment
    World Wide Web, 2020
    Co-Authors: Hao Kun, Junchang Xin, Zhiqiong Wang, Guoren Wang
    Abstract:

    Outsourced data, as the significant component of cloud service, has been widely used due to its convenience, low overhead, and high flexibility. To guarantee the integrity of outsourced data, data owner (DO) usually adopts a third party auditor (TPA) to execute the data integrity verification scheme. However, during the verification process, DO cannot fully confirm the reliability of the TPA, and handing over the verification of data integrity to the Untrusted TPA may lead to data security threats. In this paper, we focus on the problem of integrity verification of outsourced data in Untrusted Environment, that is, how to improve the security and efficiency of data integrity verification without utilizing Untrusted TPA. To address the problem, we design a decentralized model based on blockchain consisting of some collaborative verification peers (VPs), each of which maintains a replication of the entire blockchain to avoid maliciously tampering with. Based on the model, we present an advanced data integrity verification algorithm which allows DO to store and check the verification information by writing and retrieving the blockchain. In addition, in order to improve the concurrent performance, we extend the algorithm by introducing the verification group (VG) constituting by some VPs organized by Inner-Group and Inter-Group consensus protocols. We conduct a completed security analysis as well as extensive experiments of our proposed approach, and the evaluation results demonstrate that our proposed approaches achieve superior performance.

  • Blockchain-Based Outsourced Storage Schema in Untrusted Environment
    IEEE Access, 2019
    Co-Authors: Hao Kun, Junchang Xin, Zhiqiong Wang, Keyan Cao, Guoren Wang
    Abstract:

    Outsourced data, as significant service offered by the cloud service provider (CSP), can effectively facilitate the data owner (DO) overcoming the storage limitations on massive data. To ensure the availability of data, DO usually outsources the data replications to multiple CSPs (multi-CSPs) and utilizes a third party metadata management (TPMM) to dominate the metadata of the corresponding replications. However, during the outsourced procedures, DO can hardly confirm the confidence of the TPMM who may take some malicious behaviors to affect the reliability of data. Thus, DO inevitably faces data security issues caused by the over-reliance on the semi-trusted TPMM to manage the metadata of replications. In this paper, we focus on the problem of reliable outsourced data service among multi-CSPs in Untrusted Environment, that is, how to reliably store and verify the metadata of the data replications in Untrusted multi-CSPs Environment. To address the problem, we use the novel blockchain technology as a medium to build a trusted outsourced service platform. Moreover, we fully consider the innovative characteristics of blockchain including decentralized architecture, redundancy storage, collective maintenance, and tamper resistant to ensure the data cannot be changed maliciously. We first design a blockchain-based outsourced service framework for storing data replications in Untrusted Environment, which contains three key layers, that is, storage layer , verification layer , and blockchain layer . Then, we devise a novel concept of verification peer (VP) for maintaining metadata stored by a form of blockchain, and each of which holds the entire blockchain locally to prevent metadata from being maliciously tampered with. Finally, based on the proposed model, we introduce a collaborative algorithm invoked by VPs to store and verify the metadata of replications. We present a completed analysis and conduct extensive experiments on multi-CSPs scenario. The evaluation results demonstrate that our proposed approach achieves superior performance.

  • decentralized data integrity verification model in Untrusted Environment
    Web-Age Information Management, 2018
    Co-Authors: Kun Hao, Junchang Xin, Zhiqiong Wang, Zhuochen Jiang, Guoren Wang
    Abstract:

    Outsourced data, as an significant component of cloud service, has been widely used due to its convince, low overhead and high flexibility. To guarantee the integrity of outsourced data and reduce the computational overhead, data owner (DO) usually adopts a third party auditor (TPA) to execute verification scheme. However, handing over the verification of data to TPA may lead to security vulnerabilities since the TPA is not fully trusted. In this paper, we propose a novel solution for data integrity verification in Untrusted outsourced Environment. Firstly, we design a decentralized model based on blockchain, consisting by some collaborative verification peers (VPs). Based on our purposed model, we present an advanced data integrity verification algorithm, allowing DO stores and checks verification results by writing and retrieving the blockchain. Moreover, each VP maintains a replication of the entire blockchain to avoid maliciously tampering with. We evaluate our proposed approach on real outsourced data service scenario. Experimental results demonstrate that our proposed approach is efficient and effective.

Yitzhak Birk - One of the best experts on this subject based on the ideXlab platform.

  • sdsm fast and scalable security support for directory based distributed shared memory
    Hardware-Oriented Security and Trust, 2016
    Co-Authors: Ofir Shwartz, Yitzhak Birk
    Abstract:

    Secure computation is increasingly required, most notably when using public clouds. Many secure CPU architectures have been proposed, mostly focusing on single-threaded applications running on a single node. However, security for parallel and distributed computation is also needed, requiring the sharing of secret data among mutually trusting threads running in different compute nodes in an Untrusted Environment. We propose SDSM, a novel hardware approach for providing secure directory-based distributed shared memory. Unlike previously proposed schemes that cannot maintain reasonable performance beyond 32 cores, our approach allows secure parallel applications to scale efficiently to thousands of cores.

  • SDSM: Fast and scalable security support for directory-based distributed shared memory
    2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE), 2016
    Co-Authors: Ofir Shwartz, Yitzhak Birk
    Abstract:

    Secure computation is increasingly required, most notably when using public clouds. Many secure CPU architectures have been proposed, mostly focusing on single-threaded applications running on a single node. However, security for parallel and distributed computation is also needed, requiring the sharing of secret data among mutually trusting threads running in different compute nodes in an Untrusted Environment. We propose SDSM, a novel hardware approach for providing a security layer for directory-based distributed shared memory systems. Unlike previously proposed schemes that cannot maintain reasonable performance beyond 32 cores, our approach allows secure parallel applications to scale efficiently to thousands of cores.