Proof of Inaction for outsourced data with exhaustive audit

被引:0
|
作者
Han T. [1 ]
Wu Q. [1 ]
Wang K. [1 ]
Zhang Y. [1 ]
Xie S. [1 ]
机构
[1] Beihang University, Beijing
来源
基金
中国国家自然科学基金;
关键词
co-CDH assumption; Proof of Inaction; Soundness; Verifiable polynomial computation;
D O I
10.1016/j.compeleceng.2024.109403
中图分类号
学科分类号
摘要
In the existing environment of cloud storage and distributed hosting solutions, it is imperative to ensure the long-term preservation of inactive data like keyring backups and essential system logs, as these cannot afford the smallest error or data loss during storage. The current methods of subset sampling for data integrity verification fall short of these critical demands. To solve this problem, we introduce Proof of Inaction (PoI), an innovative framework for verifying the integrity of inactive data through verifiable computation principles. First, during the data owner's exhaustive audit, the storage provider must maintain complete possession of all data to validate storage integrity, which means failing any integrity challenge if even a single bit is missing. Second, PoI enables the verification of storage integrity for both single and multiple copies of data, supporting an unlimited number of challenges in each scenario. Utilizing the co-CDH assumption, we validate the correctness and soundness of our approach with the random oracle model. Both theoretical analysis and empirical evidence suggest that PoI's challenge and verification process do not escalate in overhead as the size of the challenged files increases, offering an enhancement over traditional data integrity verification methods. © 2024 Elsevier Ltd
引用
收藏
相关论文
共 50 条
  • [11] Genocide: burden of proof and inaction is costing lives in Sudan
    Singh, JA
    LANCET, 2004, 364 (9430): : 230 - 231
  • [12] Determinants of outsourced internal audit function: a further analysis
    Saeed Rabea Baatwah
    Adel Ali Al-Qadasi
    Eurasian Business Review, 2020, 10 : 629 - 659
  • [13] Determinants of outsourced internal audit function: a further analysis
    Baatwah, Saeed Rabea
    Al-Qadasi, Adel Ali
    EURASIAN BUSINESS REVIEW, 2020, 10 (04) : 629 - 659
  • [14] Data possession with outsourced data transfer
    Suraj, M. Naga
    Ariyamala, Ms.
    Test Engineering and Management, 2019, 81 (11-12): : 5399 - 5401
  • [15] Joining Privately on Outsourced Data
    Carbunar, Bogdan
    Sion, Radu
    SECURE DATA MANAGEMENT, 2010, 6358 : 70 - +
  • [16] Data Security and Privacy for Outsourced Data in the Cloud
    Sahin, Cetin
    El Abbadi, Amr
    2018 IEEE 34TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2018, : 1731 - 1734
  • [17] Provable Data Possession with Outsourced Data Transfer
    Wang, Huaqun
    He, Debiao
    Fu, Anmin
    Li, Qi
    Wang, Qihua
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) : 1929 - 1939
  • [18] Is the type of outsourced internal audit function provider associated with audit efficiency? Empirical evidence from Oman
    Baatwah, Saeed Rabea
    Al-Ebel, Abood Mohammad
    Amrah, Muneer Rajab
    INTERNATIONAL JOURNAL OF AUDITING, 2019, 23 (03) : 424 - 443
  • [19] Dynamic Outsourced Data Audit Scheme for Merkle Hash Grid-Based Fog Storage With Privacy-Preserving
    Gu, Ke
    Wang, XingQiang
    Li, Xiong
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2024, 9 (04): : 695 - 711
  • [20] Searchable Encryption for Outsourced Data Analytics
    Kerschbaum, Florian
    Sorniotti, Alessandro
    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2011, 6711 : 61 - +