期刊文献+

An Efficient Dynamic Proof of Retrievability Scheme

An Efficient Dynamic Proof of Retrievability Scheme
下载PDF
导出
摘要 Data security is a significant issue in cloud storage systems. After outsourcing data to cloud servers, clients lose physical control over the data. To guarantee clients that their data is intact on the server side, some mechanism is needed for clients to periodically check the integrity of their data. Proof of retrievability (PoR) is designed to ensure data integrity. However, most prior PoR schemes focus on static data, and existing dynamic PoR is inefficient. In this paper, we propose a new version of dynamic PoR that is based on a B+ tree and a Merkle hash tree. We propose a novel authenticated data structure, called Cloud Merkle B+ tree (CMBT). By combining CMBT with the BES signature, dynamic operations such as insertion, deletion, and modification are supported. Compared with existing PoR schemes, our scheme improves worst-case overhead from O(n) to O(log n). Data security is a significant issue in cloud storage systems. After outsourcing data to cloud servers, clients lose physical control over the data. To guarantee clients that their data is intact on the server side, some mechanism is needed for clients to periodically check the integrity of their data. Proof of retrievability (PoR) is designed to ensure data integrity. However, most prior PoR schemes focus on static data, and existing dynamic PoR is inefficient. In this paper, we propose a new version of dynamic PoR that is based on a B+ tree and a Merkle hash tree. We propose a novel authenticated data structure, called Cloud Merkle B+ tree (CMBT). By combining CMBT with the BES signature, dynamic operations such as insertion, deletion, and modification are supported. Compared with existing PoR schemes, our scheme improves worst-case overhead from O(n) to O(log n).
出处 《ZTE Communications》 2013年第2期24-29,共6页 中兴通讯技术(英文版)
基金 supported in part by the US National Science Foundation under grant CNS-1115548 and a grant from Cisco Research
关键词 cloud storage proof of retrievability data integrity B+ tree cloud storage proof of retrievability data integrity B+ tree
  • 相关文献

参考文献14

  • 1Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for- storage security in cloud computing," in Proc. 14th European Conf. Resear.b in Computer Security (ESORICS'09), St. Malo, France, pp. 355-370, Sep. 2009.
  • 2H. Shacham ind ll. Waters, "Compact proofs of retrievability," in Prot'. ldtb Int. C'otd 'l'beozy nd ApplicJtion of CiuJtology and Information Security: Advances in Ct?'ptoloy (ASIACRYIrF'08), Mellourne Australia, pp. 90-107.
  • 3G. Ateniese, I/. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song. Prnvable data possession at un/rusled stores," in Proe. 14tb ACM Confer- enee <m Computer md Commmlietions Se<'uritv (CCS" 07), Berlin. Germany, pp. 598-609.
  • 4A. Juels and B.S. Kaliski Jr, :Pors: Proot of retrievability for large files," in Proc. 14th ACM Cont Comp. anti Comnmn. ?eeurity (CCS'07), Berlin, Germa- ny, pp. 584-597.
  • 5C. Erway, A. Ktipqti, C. Papamanthou, and R. Tamassia, "Dynamic provable da- ta possession," in Pn><.eedings of the 16tb A CM Conf. Computer and Commun. Seurity (CCS "09), Chicago, IL, pp. 213-222.
  • 6K. D. Bowers, A. Juels, and A. Oprea, "Prool of retrievability: 'rheo, and imple- mentation," in Proe. ACM Workshop on Cloud Comput. Security (CC5W " 09), Chicago, IL, pp. 43-54.
  • 7G. Aleniese, R. Di Pietro, I,.V. Mancini, anti G. Tsudik, Sealable and efl'icient provable data possession," in Prec. 4th ht. Gm[ ,qeeurily and PtJwu:y h Com- mun. Networks, Istanbul, Turkey, article 9.
  • 8D. ihmeh, B. Lynn, and H. Shac'ham, Short signatures from the Well pairing," Prec. 14th Int. Conf. TbeoO, and Application of Cyptology and Information Se- curit.y: Advances in C.ptoh (AS1A CR YlYF' 0l), Gold Coast, Australia, pp. 514-532.
  • 9RI Merkle, "A digital signa! based li,mal ryp|ion function," in Proc. CltYVFO " 87: Collttl the Theory amt .4ppHcatiot of Cr?ptographie Techniques on Advances ID Ctyptology, Sanla Barlara, CA, pp. 369-378.
  • 10D. Williams and E.G. Sirer, "Optimal parameter selection ior" efficient memory integrity verificatinn using Merkle hash trees," in Proe. 3rd IEEE Int. ,Smp. Netw. Cbmp. Applic,tit)ns (NCA "04), Cambridge, M A, pp. 383-388.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部