Proof of Inaction for outsourced data with exhaustive audit

被引:0
|
作者
Han T. [1 ]
Wu Q. [1 ]
Wang K. [1 ]
Zhang Y. [1 ]
Xie S. [1 ]
机构
[1] Beihang University, Beijing
来源
基金
中国国家自然科学基金;
关键词
co-CDH assumption; Proof of Inaction; Soundness; Verifiable polynomial computation;
D O I
10.1016/j.compeleceng.2024.109403
中图分类号
学科分类号
摘要
In the existing environment of cloud storage and distributed hosting solutions, it is imperative to ensure the long-term preservation of inactive data like keyring backups and essential system logs, as these cannot afford the smallest error or data loss during storage. The current methods of subset sampling for data integrity verification fall short of these critical demands. To solve this problem, we introduce Proof of Inaction (PoI), an innovative framework for verifying the integrity of inactive data through verifiable computation principles. First, during the data owner's exhaustive audit, the storage provider must maintain complete possession of all data to validate storage integrity, which means failing any integrity challenge if even a single bit is missing. Second, PoI enables the verification of storage integrity for both single and multiple copies of data, supporting an unlimited number of challenges in each scenario. Utilizing the co-CDH assumption, we validate the correctness and soundness of our approach with the random oracle model. Both theoretical analysis and empirical evidence suggest that PoI's challenge and verification process do not escalate in overhead as the size of the challenged files increases, offering an enhancement over traditional data integrity verification methods. © 2024 Elsevier Ltd
引用
收藏
相关论文
共 50 条
  • [1] Audit Outsourced Data in Internet of Things
    Hou, Gaopan
    Ma, Jianfeng
    Li, Jiayi
    Liang, Chen
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [2] POROS: Proof of Data Reliability for Outsourced Storage
    Vasilopoulos, Dimitrios
    Elkhiyaoui, Kaoutar
    Molva, Refik
    Onen, Melek
    SCC'18: PROCEEDINGS OF THE 6TH INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2018, : 27 - 37
  • [3] TOWARDS SECURE AUDIT SERVICES FOR OUTSOURCED DATA IN CLOUD
    Sumalatha, M. R.
    Hemalathaa, S.
    Monika, R.
    Ahila, C.
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [4] PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage
    Yang, Hanzhe
    Su, Ruidan
    Huang, Pei
    Bai, Yuhan
    Fan, Kai
    Yang, Kan
    Li, Hui
    Yang, Yintang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [5] Provable Data Possession Scheme with Constant Proof Size for Outsourced Data in Public Cloud
    Purushothama, B. R.
    Amberker, B. B.
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 1662 - 1667
  • [6] Edge Computing and Blockchain-Based Distributed Audit of Outsourced Dynamic Data
    Dwivedi, Amit Kumar
    Kumar, Naveen
    Das, Manik Lal
    WIRELESS PERSONAL COMMUNICATIONS, 2024,
  • [7] PORTOS: Proof of Data Reliability for Real-World Distributed Outsourced Storage
    Vasilopoulos, Dimitrios
    Onen, Melek
    Molva, Refik
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 173 - 186
  • [8] Audit quality of outsourced information technology controls
    Mazza, Tatiana
    Azzali, Stefano
    Fornaciari, Luca
    MANAGERIAL AUDITING JOURNAL, 2014, 29 (09) : 837 - +
  • [9] Dynamic Audit Services for Outsourced Storages in Clouds
    Zhu, Yan
    Ahn, Gail-Joon
    Hu, Hongxin
    Yau, Stephen S.
    An, Ho G.
    Hu, Chang-Jun
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2013, 6 (02) : 227 - 238
  • [10] Privacy of Outsourced Data
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    PRIVACY AND IDENTITY MANAGEMENT FOR LIFE, 2010, 320 : 174 - 187