An Efficient Dynamic Proof of Retrievability (PoR) Scheme
نویسندگان
چکیده
Cloud storage has been gaining popularity because its elasticity and pay-as-you-go manner. However, this new type of storage model also brings security challenges. This paper studies the problem of how to ensure data integrity in cloud storage systems. In the Proof of Retrievability (PoR) model, after outsourcing the preprocessed data to the server, the client will delete its local copies and only store a small amount of meta data. Later the client will ask the server to provide a proof that its data can be retrieved correctly. However, most of the prior PoR works apply only to static data and the existing dynamic version of PoR scheme has an efficient problem. In this paper, we extend the static PoR scheme to dynamic scenario. That is, the client can perform update operations, e.g., insertion, deletion and modification. After each update, the client can still detect data losses even if the server tries to hide them. We develop a new version of authenticated data structure based on a B+ tree and a merkle hash tree. We call it Cloud Merkle B+ tree (CMBT ). By combining the CMBT with the BLS signature, we propose a dynamic version of PoR scheme. Compared with the existing dynamic PoR scheme, We improve the worst case performance from O(n) to O(logn).
منابع مشابه
An Efficient Proof of Retrievability Scheme for Fully Homomorphic Encrypted Data
Proof of retrievability (POR) is an interactive knowledge proof technique for a storage server to prove the integrity and ownership of clients’ data without downloading them. In this paper we consider efficiency of the POR scheme, when the data stored in cloud is encrypted under fully homomorphic encryption schemes. We presented a POR scheme with new, efficient homomorphic authenticator, which ...
متن کاملEfficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage
Cloud service providers offer various facilities to their clients. The clients with limited resources opt for some of these facilities. They can outsource their bulk data to the cloud server. The cloud server maintains these data in lieu of monetary benefits. However, a malicious cloud server might delete some of these data to save some space and offer this extra amount of storage to another cl...
متن کاملSymmetric-Key Based Proofs of Retrievability Supporting Public Verification
Proofs-of-Retrievability enables a client to store his data on a cloud server so that he executes an efficient auditing protocol to check that the server possesses all of his data in the future. During an audit, the server must maintain full knowledge of the client’s data to pass, even though only a few blocks of the data need to be accessed. Since the first work by Juels and Kaliski, many PoR ...
متن کاملStealthGuard: Proofs of Retrievability with Hidden Watchdogs
This paper presents StealthGuard, an efficient and provably secure proof of retrievabillity (POR) scheme. StealthGuard makes use of a privacypreserving word search (WS) algorithm to search, as part of a POR query, for randomly-valued blocks called watchdogs that are inserted in the file before outsourcing. Thanks to the privacy-preserving features of the WS, neither the cloud provider nor a thi...
متن کاملProofs of Data Possession and Retrievability Based on MRD Codes
Proofs of Data Possession (PoDP) scheme is essential to data outsourcing. It provides an efficient audit to convince a client that his/her file is available at the storage server, ready for retrieval when needed. An updated version of PoDP is Proofs of Retrievability (PoR), which proves the client’s file can be recovered by interactions with the storage server. We propose a PoDP/PoR scheme base...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013