期刊文献+

Proof of retrievability based on LDPC codes

Proof of retrievability based on LDPC codes
原文传递
导出
摘要 In order to reduce the computational overhead of proof of retrievability(POR) scheme, a new POR scheme based on low-density parity-check(LDPC) codes is proposed, noted as LDPC-POR. In the model of PORs scheme, the client preprocesses the data and sends it to an untrusted server for storage, only keeping some metadata. Then, the client sends a challenge to the server to prove that the data stored at the server has neither been tampered nor deleted. In the setup phase of this scheme, the client uses LDPC code to encode the data, and blinds data with permutation and pseudo-random stream. In the challenge phase, the server generates the proof completely based on exclusive OR(XOR), after that the client makes use of the LDPC code to prove the validity of proof. The theoretical analysis shows that this scheme not only reduces the computational overhead, but also saves storage space compared with the classical scheme. In the meantime security proof is also provided in this paper showing that this scheme is feasible. In order to reduce the computational overhead of proof of retrievability(POR) scheme, a new POR scheme based on low-density parity-check(LDPC) codes is proposed, noted as LDPC-POR. In the model of PORs scheme, the client preprocesses the data and sends it to an untrusted server for storage, only keeping some metadata. Then, the client sends a challenge to the server to prove that the data stored at the server has neither been tampered nor deleted. In the setup phase of this scheme, the client uses LDPC code to encode the data, and blinds data with permutation and pseudo-random stream. In the challenge phase, the server generates the proof completely based on exclusive OR(XOR), after that the client makes use of the LDPC code to prove the validity of proof. The theoretical analysis shows that this scheme not only reduces the computational overhead, but also saves storage space compared with the classical scheme. In the meantime security proof is also provided in this paper showing that this scheme is feasible.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第4期17-25,50,共10页 中国邮电高校学报(英文版)
基金 supported by the National Natural Science Foundation of China (61121061)
关键词 POR LDPC PDP cloud storage POR,LDPC,PDP,cloud storage
  • 相关文献

参考文献15

  • 1Brunette G, Mogull R. Security guidance for critical areas of focus in cloud computing v2.1. Cloud Security Alliance, 2009.
  • 2Juels A, Kaliski B S. PORs: proofs of retrievability for large files. Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07), Oct 29-Nov 2, 2007, Alexandria, VA, USA. New York, NY, USA: ACM, 2007:584-597.
  • 3Bowers K D, Juels A, Oprea A. Proofs of retrievability: theory and implementation. Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW'09), Nov 9-13, 2009, Chicago, IL, USA. New York, NY, USA: ACM, 2009:43-54.
  • 4Zheng Q J, Xu S H. Fair and dynamic proofs of retrievability. Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY'll), Feb 21-23, 2011, San Antonio, TX, USA. New York, NY, USA: ACM, 2011:237-248.
  • 5Cash D, Kiipgti A, Wichs D. Dynamic proofs of retrievability via oblivious ram. Advances in Cryptology: Proceedings of the 32rid Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'13), May 26-30, 2013, Athens, Greece. LNCS 7881. Berlin, Germany: Springer-Verlag, 2013: 279-295.
  • 6Shacham H, Waters B. Compact proofs of retrievability. Advances in Cryptology: Proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'08), Apr 13-17, 2008, Istanbul, Turkey. LNCS 4965. Berlin, Germany: Springer-Verlag, 2008:90-107.
  • 7Bowers K D, Juels A, Oprea A. HAIL: a high-availability and integrity layer for cloud storage. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09), Nov 9-13, 2009, Chicago, IL, USA. New York, NY, USA: ACM, 2009:187-198.
  • 8Xu J, Chang E C. Towards efficient proofs of retrievability. Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS'12), May 2--4, 2012, Scout, Republic of Korea. New York, NY, USA: ACM, 2012:79-80.
  • 9Ateniese G, Burns R, Curtmola R, et al. Remote data checking using provable data possession. ACM Transactions on Information and System Security, 2011, 14(1): Article 12.
  • 10Curtmola R, Khan O, Randal B, et al. MR-PDP: multiple-replica provable data possession. Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS'08), Jun 17-20, 2008, Beijing, China. Piscataway, NJ, USA: IEEE, 2008:411--420.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部