{"id":27056,"date":"2022-09-12T16:29:14","date_gmt":"2022-09-12T16:29:14","guid":{"rendered":"https:\/\/www.all4integrity.org\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/"},"modified":"2022-11-11T22:19:56","modified_gmt":"2022-11-11T22:19:56","password":"","slug":"dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments","status":"publish","type":"docs","link":"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/","title":{"rendered":"Dissertation: A new approach to information storage in cloud computing environments"},"content":{"rendered":"\n<p><strong>[Abstract]<\/strong><\/p>\n\n<p>The concern over data stored in a Cloud Computing environment has been widely discussed. Among the challenges is the problem of ensuring the integrity and recoverability of remotely stored data. In order to fill this gap, the cryptography community has proposed some concepts, among them: PDP (Proof of Data Possession), PoW (Proof of Ownership) and PoR (Proof of Recoverability).<\/p>\n\n<p>In this paper, a new PoR scheme is proposed: Hy-SAIL (Hyper-Scalability, Availability and Integrity Layer). In this proposal, a PoR is designed and implemented using Online Codes, a special case of Fountain Codes, . To perform the integrity checks, properties on a Galois body, GF(2n), are used to construct a MAC with homomorphic XOR property. Hy-SAIL has been shown to be a secure and scalable cryptographic system for providing availability of remotely stored data while meeting the demands of the complexities of communication, storage, and processing. To this end, a new adversarial model is presented that concentrates the main features of a realistic adversary for Cloud Computing environments, called the Limited Corruption Model. It is analytically proven that Hy-SAIL has demonstrable security in this adversarial model, and that the probability of attack on this scheme is asymptotically negligible. The experimental results collected from the Hy-SAIL implementation are also shown, confirming the analytical proof.<\/p>\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer sc_height_medium\"><\/div>\n\n<p><strong>Publication Year:<\/strong> 2013<\/p>\n\n<p><strong>Student:<\/strong> <a href=\"https:\/\/www.escavador.com\/sobre\/4421290\/dino-macedo-amaral\" target=\"_blank\" rel=\"noreferrer noopener\">Dino Macedo Amaral<\/a><\/p>\n\n<p><strong>Advisor:<\/strong> <a href=\"https:\/\/www.escavador.com\/sobre\/9057479\/anderson-clayton-alves-nascimento\" target=\"_blank\" rel=\"noreferrer noopener\">Prof. Dr. Anderson Clayton Alves Nascimento<\/a><\/p>\n\n<p><strong>Program<\/strong>: <a href=\"https:\/\/ppgee.unb.br\/index.php\/pt\/\" target=\"_blank\" rel=\"noreferrer noopener\">PhD in Electrical Engineering<\/a><\/p>\n\n<p><strong>University:<\/strong> <a href=\"http:\/\/www.ene.unb.br\/\" target=\"_blank\" rel=\"noreferrer noopener\">Faculty of Technology at the University of Brasilia<\/a> (Brazil)<\/p>\n\n<p><strong>More information:<\/strong> <a href=\"https:\/\/repositorio.unb.br\/handle\/10482\/15690\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/repositorio.unb.br\/handle\/10482\/15690<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[Abstract] The concern over data stored in a Cloud Computing environment has been widely discussed.&hellip;<\/p>\n","protected":false},"author":98,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"doc_category":[354],"doc_tag":[356,365,333],"class_list":["post-27056","docs","type-docs","status-publish","hentry","doc_category-business-activity-infrastructure-energy","doc_tag-integrity","doc_tag-integrity-technologies","doc_tag-theses-dissertations"],"acf":[],"year_month":"2026-04","word_count":248,"total_views":"224","reactions":{"happy":"0","normal":"0","sad":"0"},"author_info":{"name":"escolas","author_nicename":"escolas","author_url":"https:\/\/www.all4integrity.org\/en\/author\/escolas\/"},"doc_category_info":[{"term_name":"Business Activity, Infrastructure &amp; Energy","term_url":"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/categoria\/business-activity-infrastructure-energy\/"}],"doc_tag_info":[{"term_name":"Integrity","term_url":"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/tag\/integrity\/"},{"term_name":"Integrity Technologies","term_url":"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/tag\/integrity-technologies\/"},{"term_name":"Theses &amp; Dissertations","term_url":"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/tag\/theses-dissertations\/"}],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Dissertation: A new approach to information storage in cloud computing environments - ALL4INTEGRITY<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dissertation: A new approach to information storage in cloud computing environments - ALL4INTEGRITY\" \/>\n<meta property=\"og:description\" content=\"[Abstract] The concern over data stored in a Cloud Computing environment has been widely discussed.&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/\" \/>\n<meta property=\"og:site_name\" content=\"ALL4INTEGRITY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/all4integrity\/\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-11T22:19:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@All4Integrity\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/\",\"url\":\"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/\",\"name\":\"Dissertation: A new approach to information storage in cloud computing environments - ALL4INTEGRITY\",\"isPartOf\":{\"@id\":\"https:\/\/www.all4integrity.org\/en\/#website\"},\"datePublished\":\"2022-09-12T16:29:14+00:00\",\"dateModified\":\"2022-11-11T22:19:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.all4integrity.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dissertation: A new approach to information storage in cloud computing environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.all4integrity.org\/en\/#website\",\"url\":\"https:\/\/www.all4integrity.org\/en\/\",\"name\":\"ALL4INTEGRITY\",\"description\":\"Mobiliza\u00e7\u00e3o e Solu\u00e7\u00f5es contra a Corrup\u00e7\u00e3o\",\"publisher\":{\"@id\":\"https:\/\/www.all4integrity.org\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.all4integrity.org\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.all4integrity.org\/en\/#organization\",\"name\":\"All4Integrity\",\"url\":\"https:\/\/www.all4integrity.org\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.all4integrity.org\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/all4integrity.org\/wp-content\/uploads\/2022\/05\/logotipo-all4integrity-1.png\",\"contentUrl\":\"https:\/\/all4integrity.org\/wp-content\/uploads\/2022\/05\/logotipo-all4integrity-1.png\",\"width\":600,\"height\":137,\"caption\":\"All4Integrity\"},\"image\":{\"@id\":\"https:\/\/www.all4integrity.org\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/all4integrity\/\",\"https:\/\/x.com\/All4Integrity\",\"https:\/\/www.instagram.com\/all_4_integrity\/\",\"https:\/\/www.youtube.com\/channel\/UC03HJFKiaCStfIHFnfdRbvA\",\"https:\/\/www.linkedin.com\/company\/associao-all4integrity\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dissertation: A new approach to information storage in cloud computing environments - ALL4INTEGRITY","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/","og_locale":"en_US","og_type":"article","og_title":"Dissertation: A new approach to information storage in cloud computing environments - ALL4INTEGRITY","og_description":"[Abstract] The concern over data stored in a Cloud Computing environment has been widely discussed.&hellip;","og_url":"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/","og_site_name":"ALL4INTEGRITY","article_publisher":"https:\/\/www.facebook.com\/all4integrity\/","article_modified_time":"2022-11-11T22:19:56+00:00","twitter_card":"summary_large_image","twitter_site":"@All4Integrity","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/","url":"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/","name":"Dissertation: A new approach to information storage in cloud computing environments - ALL4INTEGRITY","isPartOf":{"@id":"https:\/\/www.all4integrity.org\/en\/#website"},"datePublished":"2022-09-12T16:29:14+00:00","dateModified":"2022-11-11T22:19:56+00:00","breadcrumb":{"@id":"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.all4integrity.org\/en\/tech4integrity\/knowledge-center\/dissertation-a-new-approach-to-information-storage-in-cloud-computing-environments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.all4integrity.org\/en\/"},{"@type":"ListItem","position":2,"name":"Dissertation: A new approach to information storage in cloud computing environments"}]},{"@type":"WebSite","@id":"https:\/\/www.all4integrity.org\/en\/#website","url":"https:\/\/www.all4integrity.org\/en\/","name":"ALL4INTEGRITY","description":"Mobiliza\u00e7\u00e3o e Solu\u00e7\u00f5es contra a Corrup\u00e7\u00e3o","publisher":{"@id":"https:\/\/www.all4integrity.org\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.all4integrity.org\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.all4integrity.org\/en\/#organization","name":"All4Integrity","url":"https:\/\/www.all4integrity.org\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.all4integrity.org\/en\/#\/schema\/logo\/image\/","url":"https:\/\/all4integrity.org\/wp-content\/uploads\/2022\/05\/logotipo-all4integrity-1.png","contentUrl":"https:\/\/all4integrity.org\/wp-content\/uploads\/2022\/05\/logotipo-all4integrity-1.png","width":600,"height":137,"caption":"All4Integrity"},"image":{"@id":"https:\/\/www.all4integrity.org\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/all4integrity\/","https:\/\/x.com\/All4Integrity","https:\/\/www.instagram.com\/all_4_integrity\/","https:\/\/www.youtube.com\/channel\/UC03HJFKiaCStfIHFnfdRbvA","https:\/\/www.linkedin.com\/company\/associao-all4integrity\/"]}]}},"knowledge_base_info":[],"knowledge_base_slug":[],"_links":{"self":[{"href":"https:\/\/www.all4integrity.org\/en\/wp-json\/wp\/v2\/docs\/27056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.all4integrity.org\/en\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/www.all4integrity.org\/en\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/www.all4integrity.org\/en\/wp-json\/wp\/v2\/users\/98"}],"replies":[{"embeddable":true,"href":"https:\/\/www.all4integrity.org\/en\/wp-json\/wp\/v2\/comments?post=27056"}],"version-history":[{"count":0,"href":"https:\/\/www.all4integrity.org\/en\/wp-json\/wp\/v2\/docs\/27056\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.all4integrity.org\/en\/wp-json\/wp\/v2\/media?parent=27056"}],"wp:term":[{"taxonomy":"doc_category","embeddable":true,"href":"https:\/\/www.all4integrity.org\/en\/wp-json\/wp\/v2\/doc_category?post=27056"},{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/www.all4integrity.org\/en\/wp-json\/wp\/v2\/doc_tag?post=27056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}