Proof of Inaction for outsourced data with exhaustive audit

被引:0
|
作者
Han T. [1 ]
Wu Q. [1 ]
Wang K. [1 ]
Zhang Y. [1 ]
Xie S. [1 ]
机构
[1] Beihang University, Beijing
来源
基金
中国国家自然科学基金;
关键词
co-CDH assumption; Proof of Inaction; Soundness; Verifiable polynomial computation;
D O I
10.1016/j.compeleceng.2024.109403
中图分类号
学科分类号
摘要
In the existing environment of cloud storage and distributed hosting solutions, it is imperative to ensure the long-term preservation of inactive data like keyring backups and essential system logs, as these cannot afford the smallest error or data loss during storage. The current methods of subset sampling for data integrity verification fall short of these critical demands. To solve this problem, we introduce Proof of Inaction (PoI), an innovative framework for verifying the integrity of inactive data through verifiable computation principles. First, during the data owner's exhaustive audit, the storage provider must maintain complete possession of all data to validate storage integrity, which means failing any integrity challenge if even a single bit is missing. Second, PoI enables the verification of storage integrity for both single and multiple copies of data, supporting an unlimited number of challenges in each scenario. Utilizing the co-CDH assumption, we validate the correctness and soundness of our approach with the random oracle model. Both theoretical analysis and empirical evidence suggest that PoI's challenge and verification process do not escalate in overhead as the size of the challenged files increases, offering an enhancement over traditional data integrity verification methods. © 2024 Elsevier Ltd
引用
收藏
相关论文
共 50 条
  • [31] Toward Private Joins on Outsourced Data
    Carbunar, Bogdan
    Sion, Radu
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2012, 24 (09) : 1699 - 1710
  • [32] Integrity and Confidentiality in Cloud Outsourced Data
    Rady, Mai
    Abdelkader, Tamer
    Ismail, Rasha
    AIN SHAMS ENGINEERING JOURNAL, 2019, 10 (02) : 275 - 285
  • [33] Auditing of Outsourced Data Integrity - A Taxonomy
    Srivastava, Akhilesh Kumar
    Kumar, Manoj
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2023, 16 (08) : 805 - 824
  • [34] Verifiable Computation on Outsourced Encrypted Data
    Lai, Junzuo
    Deng, Robert H.
    Pang, Hweehwa
    Weng, Jian
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 273 - 291
  • [35] A Secure Data Transmission Mechanism for Cloud Outsourced Data
    Alhaj, Abdullah
    Aljawarneh, Shadi
    Masadeh, Shadi
    Abu-Taieh, Evon
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2013, 3 (01) : 34 - 43
  • [36] A Scheme for Verifying the Integrity of Outsourced Data
    WANG Xiaoming
    YU Fang
    LIN Yanchun
    GAN Qingqing
    WU Daini
    China Communications, 2015, 12 (11) : 188 - 195
  • [37] Confidentiality enforcement for XML outsourced data
    Carminati, Barbara
    Ferrari, Elena
    CURRENT TRENDS IN DATABASE TECHNOLOGY - EDBT 2006, 2006, 4254 : 234 - 249
  • [38] Encrypted SVM for Outsourced Data Mining
    Liu, Fang
    Ng, Wee Keong
    Zhang, Wei
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 1085 - 1092
  • [39] NTSB blasts FAA inaction on data recorders
    不详
    AVIATION WEEK & SPACE TECHNOLOGY, 1996, 144 (19): : 33 - 33
  • [40] Missing inaction: the dangers of ignoring missing data
    Nakagawa, Shinichi
    Freckleton, Robert P.
    TRENDS IN ECOLOGY & EVOLUTION, 2008, 23 (11) : 592 - 596