MR-PDP: Multiple-Replica Provable Data Possession

被引:253
|
作者
Curtmola, Reza [1 ]
Khan, Osama [2 ]
Burns, Randal [2 ]
Ateniese, Giuseppe [2 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Johns Hopkins Univ, Dept Comp Sci, Baltimore, MD 21218 USA
关键词
D O I
10.1109/ICDCS.2008.68
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of the data are actually stored Storage servers can collude to make it look like they are storing many copies of the data, whereas in reality they only store a single copy. We address this shortcoming through multiple-replica provable data possession (MR-PDP): A provably-secure scheme that allows a client that stores t replicas of a file in a storage system to verify through a challenge-response protocol that (1) each unique replica can be produced at the time of the challenge and that (2) the storage system uses t times the storage required to store a single replica. MR-PDP extends previous work on data possession proofs for a single copy of a file in a client/server storage system [4]. Using MR-PDP to store t replicas is computationally much more efficient than using a single-replica PDP scheme to store t separate, unrelated files (e.g., by encrypting each file separately prior to storing it). Another advantage of MR-PDP is that it can generate further replicas on demand, at little expense, when some of the existing replicas fail.
引用
收藏
页码:411 / +
页数:2
相关论文
共 50 条
  • [21] Distributed data possession provable in cloud
    Mingxu Yi
    Lifeng Wang
    Jinxia Wei
    Distributed and Parallel Databases, 2017, 35 : 1 - 21
  • [22] Online/Offline Provable Data Possession
    Wang, Yujue
    Wu, Qianhong
    Qin, Bo
    Tang, Shaohua
    Susilo, Willy
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1182 - 1194
  • [23] Multiple-Replica Cloud Data Integrity Verification Scheme based on B plus Tree
    Li, Haoyu
    Li, Qingpeng
    Zhang, Longjun
    2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 2279 - 2282
  • [24] An Effective Scheme for Provable Data Possession
    Bu, Shanyue
    Huang, Mengdie
    Yu, Kun
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND COMPUTER APPLICATION, 2016, 30 : 344 - 348
  • [25] Provable Data Possession at Untrusted Stores
    Ateniese, Giuseppe
    Burns, Randal
    Curtmola, Reza
    Herring, Joseph
    Kissner, Lea
    Peterson, Zachary
    Song, Dawn
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 598 - +
  • [26] Distributed data possession provable in cloud
    Yi, Mingxu
    Wang, Lifeng
    Wei, Jinxia
    DISTRIBUTED AND PARALLEL DATABASES, 2017, 35 (01) : 1 - 21
  • [27] Provable Data Possession in Cloud Computing
    Shuang, Tan
    Zhang Jianfeng
    Chen Zhikun
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1406 - 1413
  • [28] Multiple-Replica Public Auditing Protocol for Cloud Storage
    Liu, Hongwei
    Wang, Shulan
    Zhang, Peng
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 999 - 1004
  • [29] Popularity-based multiple-replica cloud storage integrity auditing for big data
    Chen, Guoqing
    Hao, Rong
    Yang, Ming
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 163
  • [30] Provable data transfer from provable data possession and deletion in cloud storage
    Xue, Liang
    Ni, Jianbing
    Li, Yannan
    Shen, Jian
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 46 - 54