NJIT researchers received a top honor for their ideas on better ways to ensure the integrity and long-term reliability of data stored at potentially untrusted cloud storage providers. "Towards Self-Repairing Replication-Based Storage Systems Using Untrusted Clouds," was written by Bo Chen, a doctoral candidate, and his advisor, NJIT Assistant Professor Reza Curtmola, both in NJIT's College of Computing Sciences (CCS).
The work recently received the "Outstanding Paper Award" from the prestigious 3rd ACM Conference on Data and Application Security and Privacy (CODASPY 2013) and was published in February of 2013 in the Proceedings of the Third ACM Conference on Data and Application Security and Privacy.
"We are very happy to see that this important work has received such a high level of peer recognition," said CCS Interim Dean James Geller and chair of the department of computer science. "Computer security today is on everyone's mind and we take our mission seriously at NJIT to get the word out so that computing can be safer and easier for everyone--whether people are trying to protect banking accounts or military secrets. This is an enormous growth area in research and education."
"We wanted to take an in depth look at cloud storage security," said Curtmola. "This is an especially important issue for anyone dealing with large amounts of data that are supposed to be stored for a long period, such as archival and backup data. Using our techniques data owners can audit the service provided by the cloud and assess the risk of outsourcing their data to the cloud. We think the information will be of great help to anyone dealing with data storage."
Unlike previous work in this area, the NJIT paper proposed a new paradigm, in which the data owner is able to outsource not only the storage but also the management of her data. Whenever data corruption is detected, the storage servers collaborate among themselves to repair the corruption, and the data owner acts only as a coordinator. This minimizes the load on the data owner during repair and represents a departure from previous work, which imposes a heavy burden on the data owner during data repair.
The proposed paradigm has the advantage of minimizing the workload for data owners, but it also introduces a new type of attack: A set of malicious storage servers could collude to generate on the fly data that should be stored at all times. Thus, the main technical challenge in the paper was how to enforce that the untrusted servers manage the data properly over time. The main insights behind the solution were: (a) replicas of the data are differentiated based on a controllable amount of masking, which offers flexibility in handling different adversarial strengths, and (b) replica generation is time consuming. The NJIT researchers validated the practicality of their solution through a software prototype built on Amazon's cloud platform.
This work is part of a series of articles supported by a National Science Foundation CAREER grant awarded to Curtmola in 2011.
Curtmola is an expert in information security and applied cryptography. His research interests include security of cloud services, security of wireless networks and security of mobile computing.
CODASPY is a new conference endorsed by the ACM Special Interest Group on Security, Audit and Control (SIGSAC). It provides a dedicated venue for high-quality research about security and privacy at the data and application layers, and seeks to foster a community with this focus in cyber security.
NJIT, New Jersey's science and technology university, enrolls more than 9,943 students pursuing bachelor's, master's and doctoral degrees in 120 programs. The university consists of six colleges: Newark College of Engineering, College of Architecture and Design, College of Science and Liberal Arts, School of Management, College of Computing Sciences and Albert Dorman Honors College. U.S. News & World Report's 2012 Annual Guide to America's Best Colleges ranked NJIT in the top tier of national research universities. NJIT is internationally recognized for being at the edge in knowledge in architecture, applied mathematics, wireless communications and networking, solar physics, advanced engineered particulate materials, nanotechnology, neural engineering and e-learning. Many courses and certificate programs, as well as graduate degrees, are available online through the Division of Continuing Professional Education.
AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.