MR-PDP: Multiple-Replica Provable Data Possession

被引:253
|
作者
Curtmola, Reza [1 ]
Khan, Osama [2 ]
Burns, Randal [2 ]
Ateniese, Giuseppe [2 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Johns Hopkins Univ, Dept Comp Sci, Baltimore, MD 21218 USA
关键词
D O I
10.1109/ICDCS.2008.68
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of the data are actually stored Storage servers can collude to make it look like they are storing many copies of the data, whereas in reality they only store a single copy. We address this shortcoming through multiple-replica provable data possession (MR-PDP): A provably-secure scheme that allows a client that stores t replicas of a file in a storage system to verify through a challenge-response protocol that (1) each unique replica can be produced at the time of the challenge and that (2) the storage system uses t times the storage required to store a single replica. MR-PDP extends previous work on data possession proofs for a single copy of a file in a client/server storage system [4]. Using MR-PDP to store t replicas is computationally much more efficient than using a single-replica PDP scheme to store t separate, unrelated files (e.g., by encrypting each file separately prior to storing it). Another advantage of MR-PDP is that it can generate further replicas on demand, at little expense, when some of the existing replicas fail.
引用
收藏
页码:411 / +
页数:2
相关论文
共 50 条
  • [31] Provable multiple replication data possession with full dynamics for secure cloud storage
    Zhang, Yafang
    Ni, Jianbing
    Tao, Xiaoling
    Wang, Yong
    Yu, Yong
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1161 - 1173
  • [32] Remote Data Checking Using Provable Data Possession
    Ateniese, Giuseppe
    Burns, Randal
    Curtmola, Reza
    Herring, Joseph
    Khan, Osama
    Kissner, Lea
    Peterson, Zachary
    Song, Dawn
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [33] Delegable Provable Data Possession for Remote Data in the Clouds
    Shen, Shiuan-Tzuo
    Tzeng, Wen-Guey
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 93 - 111
  • [34] Multiple-replica auditing in clouds using Shamir secret sharing
    Tian H.
    Chen Y.
    Huang Y.
    Lu J.
    2016, Huazhong University of Science and Technology (44): : 77 - 82
  • [35] A Provable Data Possession Scheme with Data Hierarchy in Cloud
    Lin, Changlu
    Luo, Fucai
    Wang, Huaxiong
    Zhu, Yan
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 301 - 321
  • [36] Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage
    Liu, Yudong
    Wang, Xu An
    Cao, Yunfei
    Tang, Dianhua
    Yang, Xiaoyuan
    ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, 2019, 23 : 445 - 452
  • [37] Proxy Provable Data Possession in Public Clouds
    Wang, Huaqun
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2013, 6 (04) : 551 - 559
  • [38] Robust/Recover Provable Data Possession Protocol
    Feng, Chao
    Wang, Honghong
    Wan, Wenbo
    Li, Qinghua
    Xu, Fangzhou
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 574 - 587
  • [39] A Survey on Provable Data Possession in Cloud Storage
    Thangavel, M.
    Varalakshmi, P.
    Sindhuja, R.
    Sridhar, S.
    2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 25 - 31
  • [40] Efficient Provable Data Possession for Hybrid Clouds
    Zhu, Yan
    Wang, Huaixi
    Hu, Zexing
    Ahn, Gail-Joon
    Hu, Hongxin
    Yau, Stephen S.
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 756 - 758