Remote Integrity Check with Dishonest Storage Server

نویسندگان

  • Ee-Chien Chang
  • Jia Xu
چکیده

We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server, by adapting the challenges and responses, tries to discard partial information of x and yet evades detection. Besides the security requirements, there are considerations on communication, storage size and computation time. Juels et al. [10] gave a security model for Proof of Retrievability (POR) system. The model imposes a requirement that the original x can be recovered from multiple challenges-responses. Such requirement is not necessary in our problem. Hence, we propose an alternative security model for Remote Integrity Check (RIC). We study a few schemes and analyze their efficiency and security. In particular, we prove the security of a proposed scheme HENC. This scheme can be deployed as a POR system and it also serves as an example of an effective POR system whose “extraction” is not verifiable. We also propose a combination of the RSA-based scheme by Filho et al. [7] and the ECC-based authenticator by Naor et al. [12], which achieves good asymptotic performance. This scheme is not a POR system and seems to be a secure RIC. In-so-far, all schemes that have been proven secure can also be adopted as POR systems. This brings out the question of whether there are fundamental differences between the two models. To highlight the differences, we introduce a notion, trap-door compression, that captures a property on compressibility.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Remote Integrity Check with Dishonest Storage Server ? Ee - Chien

We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server, by adapting the challenges and responses, tries to discard partial information of x and yet evades detection. Besides the security requirements, there are considerations on communication, storage size and computation...

متن کامل

Remote Data Integrity Check and Data Uploading Using Client and Server Proxies

Large number of clients like to store data onto public cloud server (PCS) due to increase in advancement in cloud computing. As a result the new security problems are in need to be solved to help large number of clients in processing their data on public cloud servers. When the clients are not allowed to access the public cloud servers, they will be forwarded to proxy servers to process their d...

متن کامل

Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures

Cloud storage allows cloud users to enjoy the on-demand and high quality data storage services without the burden of local data storage and maintenance. However, the cloud servers are not necessarily fully trusted. As a consequence, whether the data stored on the cloud are intact becomes a major concern. To solve this challenging problem, recently, Chen proposed a remote data possession checkin...

متن کامل

Achieving Remote Data Integrity Verification and Eradicating Semihonest Attack in Multicloud Storage

Data Storage outsourcing in cloud computing is a rising trend which prompts a number of interesting security issues. Provable data possession (PDP) is a method for ensuring the integrity of data in storage outsourcing. Remote integrity checking is crucial in cloud storage, here using multi cloud. It can help the clients to check their whole outsourced data by without downloading. This research ...

متن کامل

Preserving Privacy using Third Party Auditor in Cloud for Data Storage

Cloud computing is a internet based thing or next generation in information technology. Users store their large amount of data on a cloud server at the remote place without worrying about storage correctness and integrity of data. Security is viewed as one of the top positioned open issues in cloud computing. In most of the before proposed schemes, RSA algorithm was used for storage security. A...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008