Scalable and efficient provable data possession
Top Cited Papers
- 22 September 2008
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- Vol. 2008, 9
- https://doi.org/10.1145/1460877.1460889
Abstract
Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively investigated in the past. However, Provable Data Possession (PDP) is a topic that has only recently appeared in the research literature. The main issue is how to frequently, efficiently and securely verify that a storage server is faithfully storing its client's (potentially very large) outsourced data. The storage server is assumed to be untrusted in terms of both security and reliability. (In other words, it might maliciously or accidentally erase hosted data; it might also relegate it to slow or off-line storage.) The problem is exacerbated by the client being a small computing device with limited resources. Prior work has addressed this problem using either public key cryptography or requiring the client to outsource its data in encrypted form. In this paper, we construct a highly efficient and provably secure PDP technique based entirely on symmetric key cryptography, while not requiring any bulk encryption. Also, in contrast with its predecessors, our PDP technique allows outsourcing of dynamic data, i.e, it efficiently supports operations, such as block modification, deletion and append.Keywords
Funding Information
- Generalitat de Catalunya (2005 SGR 0446)
- Ministerio de Educación, Cultura y Deporte (TSI2007-65406-C03-01CSD2007-00004)
- Army Research Office (911NF0410280)
This publication has 14 references indexed in Scilit:
- Provable data possession at untrusted storesPublished by Association for Computing Machinery (ACM) ,2007
- Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered StoragePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- The Complexity of Online Memory CheckingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Sanitizable SignaturesLecture Notes in Computer Science, 2005
- Public Key Encryption with Keyword SearchLecture Notes in Computer Science, 2004
- Secure Conjunctive Keyword Search over Encrypted DataLecture Notes in Computer Science, 2004
- OCBACM Transactions on Information and System Security, 2003
- Executing SQL over encrypted data in the database-service-provider modelPublished by Association for Computing Machinery (ACM) ,2002
- Peer-to-peer data trading to preserve informationACM Transactions on Information Systems, 2002
- OceanStoreACM SIGPLAN Notices, 2000