Download now Free registration required
Migrating applications with strong consistency requirements to public cloud platforms remains risky since the data owner cannot verify the correctness of the public cloud's locking algorithm. In this paper, the authors identify new attacks that an untrusted cloud provider can launch via control of the locking mechanism and propose an extension to existing locking scheme to address such attacks. The solutions modifies the read and write locks to include a short history to allow data users to verify the correctness of their assigned locks, and can also prevent the cloud from re-ordering operations for financial gain.
- Format: PDF
- Size: 399.1 KB