MR-PDP: Multiple-Replica Provable Data Possession

被引:253
|
作者
Curtmola, Reza [1 ]
Khan, Osama [2 ]
Burns, Randal [2 ]
Ateniese, Giuseppe [2 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Johns Hopkins Univ, Dept Comp Sci, Baltimore, MD 21218 USA
关键词
D O I
10.1109/ICDCS.2008.68
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of the data are actually stored Storage servers can collude to make it look like they are storing many copies of the data, whereas in reality they only store a single copy. We address this shortcoming through multiple-replica provable data possession (MR-PDP): A provably-secure scheme that allows a client that stores t replicas of a file in a storage system to verify through a challenge-response protocol that (1) each unique replica can be produced at the time of the challenge and that (2) the storage system uses t times the storage required to store a single replica. MR-PDP extends previous work on data possession proofs for a single copy of a file in a client/server storage system [4]. Using MR-PDP to store t replicas is computationally much more efficient than using a single-replica PDP scheme to store t separate, unrelated files (e.g., by encrypting each file separately prior to storing it). Another advantage of MR-PDP is that it can generate further replicas on demand, at little expense, when some of the existing replicas fail.
引用
收藏
页码:411 / +
页数:2
相关论文
共 50 条
  • [41] AN IMPROVED DYNAMIC PROVABLE DATA POSSESSION MODEL
    Liu, Feifei
    Gu, Dawu
    Lu, Haining
    2011 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS, 2011, : 290 - 295
  • [42] IntegrityChain: Provable Data Possession for Decentralized Storage
    Li, Yannan
    Yu, Yong
    Chen, Ruonan
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (06) : 1205 - 1217
  • [43] New provable data transfer from provable data possession and deletion for secure cloud storage
    Liu, Yudong
    Xiao, Shuai
    Wang, Han
    Wang, Xu An
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04)
  • [44] Batch Provable Data Possession Scheme with Error Locating
    Pang X.-Q.
    Wang T.-Q.
    Chen W.-J.
    Ren M.-Q.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (02): : 362 - 380
  • [45] Identity-Based Batch Provable Data Possession
    Zhou, Fucai
    Peng, Su
    Xu, Jian
    Xu, Zifeng
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 112 - 129
  • [46] Revisiting "online/offline provable data possession"schemes
    Wang, Feng
    Lin, Changlu
    Yuan, Manli
    COMPUTER STANDARDS & INTERFACES, 2025, 91
  • [47] Multiple Replica based Remote Data Possession Checking Scheme based on Matrix Representation of Data
    Balamurugan, B.
    Mandadi, Akhil Reddy
    Mohan, Sabana
    Faahtheima, Sherein
    INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [48] Accurate Location in Batch Dynamic Provable Data Possession
    Li, Mingchu
    Zhang, Liang
    Guo, Cheng
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 9 - 12
  • [49] Blockchain-Based Private Provable Data Possession
    Wang, Huaqun
    Wang, Qihua
    He, Debiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2379 - 2389
  • [50] Oriented Group Provable Data Possession in Public Cloud
    Ren, Yongjun
    Xu, Jiang
    Wang, Jin
    Fang, Liming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 775 - 778