PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
Tytuł artykułu

Proof of Multicopy via Proof of File Position in Cloud

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
For disaster recovery, we store backups of a file in several positions far away from each other. If we delegate this task to an untrusted cloud service provider, a verification method is desired. In this paper, we construct a generic transformation from “proof of retrievability” to “proof of multicopy”. We present this work in two stages. In the first stage, we propose a generic protocol of “proof of file position” based on an arbitrary secure “proof of retrievability” protocol. In the second stage, we propose a “proof of multicopy” protocol based on our “proof of file position” protocol. Both of our protocols are provably secure.
Wydawca
Rocznik
Strony
141--151
Opis fizyczny
Bibliogr. 23 poz.
Twórcy
autor
  • Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China
autor
  • School of Computer Science and Software Engineering, East China Normal University, Shanghai, China
autor
  • School of Computer Science and Software Engineering, East China Normal University, Shanghai, China
autor
  • School of Computer Science and Software Engineering, East China Normal University, Shanghai, China
Bibliografia
  • [1] Juels A, Jr BSK. Pors: proofs of retrievability for large files. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007 pp. 584-597. doi:10.1145/1315245.1315317.
  • [2] Bowers KD, Juels A, Oprea A. Proofs of retrievability: theory and implementation. In: Proceedings of the first ACM Cloud Computing Security Workshop, CCSW 2009, Chicago, IL, USA, November 13, 2009 pp. 43-54. doi:10.1145/1655008.1655015.
  • [3] Dodis Y, Vadhan SP, Wichs D. Proofs of Retrievability via Hardness Amplification. In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings pp. 109-127. URL https://doi.org/10.1007/978-3-642-00457-5_8.
  • [4] Bowers KD, Juels A, Oprea A. HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009 pp. 187-198. URL 0.1145/1653662.1653686.
  • [5] Shacham H, Waters B. Compact Proofs of Retrievability. J. Cryptology, 2013;26(3):442-483. doi:10.1007/s00145-012-9129-2.
  • [6] Ateniese G, Burns RC, Curtmola R, Herring J, Kissner L, Peterson ZNJ, Song DX. Provable data possession at untrusted stores. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007 pp. 598-609. doi:10.1145/1315245.1315318.
  • [7] Zeng K. Publicly Verifiable Remote Data Integrity. In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20–22, 2008, Proceedings pp. 419-434. URL https://doi.org/10.1007/978-3-540-88625-9_28.
  • [8] Sebé F, Domingo-Ferrer J, Martínez-Ballesté A, Deswarte Y, Quisquater J. Efficient Remote Data Possession Checking in Critical Information Infrastructures. IEEE Trans. Knowl. Data Eng., 2008;20(8):1034-1038. doi:10.1109/TKDE.2007.190647.
  • [9] Shah MA, Baker M, Mogul JC, Swaminathan R. Auditing to Keep Online Storage Services Honest. In: Proceedings of HotOS’07: 11th Workshop on Hot Topics in Operating Systems, May 7-9, 2005, San Diego, California, USA. 2007. URL http://dl.acm.org/citation.cfm?id=1361397.1361408.
  • [10] Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases. TOS, 2006;2(2):107-138. doi:10.1145/1149976.1149977.
  • [11] Ateniese G, Pietro RD, Mancini LV, Tsudik G. Scalable and efficient provable data possession. In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008 p. 9. doi:10.1145/1460877.1460889.
  • [12] Erway CC, Küpçü A, Papamanthou C, Tamassia R. Dynamic Provable Data Possession. ACM Trans. Inf. Syst. Secur., 2015;17(4):15. doi:10.1145/2699909.
  • [13] Wang Q, Wang C, Li J, Ren K, Lou W. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings pp. 355-370. ISBN:3-642-04443-3, 978-3-642-04443-4.
  • [14] Hao Z, Zhong S, Yu N. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability. IEEE Trans. Knowl. Data Eng., 2011;23(9):1432-1437. doi:10.1109/TKDE.2011.62.
  • [15] Peterson ZNJ, Gondree M, Beverly R. A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud. In: 3rd USENIX Workshop on Hot Topics in Cloud Computing, HotCloud’11, Portland, OR, USA, June 14-15, 2011. URL http://dl.acm.org/citation.cfm?id=2170444.2170453.
  • [16] Noman ANM, Adams CM. DLAS: Data Location Assurance Service for cloud computing environments. In: Tenth Annual International Conference on Privacy, Security and Trust, PST 2012, Paris, France, July 16-18, 2012 pp. 225-228. doi:10.1109/PST.2012.6297945.
  • [17] Ries T, Fusenig V, Vilbois C, Engel T. Verification of Data Location in Cloud Networking. In: IEEE 4th International Conference on Utility and Cloud Computing, UCC 2011, Melbourne, Australia, December 5-8, 2011 pp. 439-444. doi:10.1109/UCC.2011.72.
  • [18] Albeshri A, Boyd C, Nieto JMG. GeoProof: Proofs of Geographic Location for Cloud Computing Environment. In: 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), Macau, China, June 18-21, 2012 pp. 506-514. doi:10.1109/ICDCSW.2012.50.
  • [19] Brands S, Chaum D. Distance-Bounding Protocols (Extended Abstract). In: Advances in Cryptology - EUROCRYPT’93, Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings pp. 344-359. URL https://doi.org/10.1007/3-540-48285-7_30.
  • [20] Curtmola R, Khan O, Burns RC, Ateniese G. MR-PDP: Multiple-Replica Provable Data Possession. In: 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17-20 June 2008, Beijing, China. 2008 pp. 411-420. doi:10.1109/ICDCS.2008.68.
  • [21] Barsoum AF, Hasan MA. Provable possession and replication of data over cloud servers. Centre For Applied Cryptographic Research (CACR), University of Waterloo, Report, 2010. 32:2010.
  • [22] Hao Z, Yu N. A multiple-replica remote data possession checking protocol with public verifiability. In: Data, Privacy and E-Commerce (ISDPE), 2010 Second International Symposium on. IEEE, 2010 pp. 84-89. doi:10.1109/ISDPE.2010.20.
  • [23] Barsoum AF, Hasan MA. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems. IEEE Trans. Information Forensics and Security, 2015;10(3):485-497. doi:10.1109/TIFS.2014.2384391.
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2018).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-2253bba3-ca40-49e2-b649-7d346b68432e
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.