Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
Citations
1,783 citations
305 citations
Cites background or methods or result from "Dynamic-Hash-Table Based Public Aud..."
...Definition 3 (BLS-HVA): Given a data file that contains n blocks, F = {m1, m2, m3, · · · , mi , · · · , mn}, let G and GT be two multiplicative cyclic groups of a large prime order p, and let e : G×G → GT be a bilinear pairing....
[...]
...Specifically, our protocol is less computationally expensive both in performing single auditing task and batch auditing tasks compared to [17]....
[...]
...Inspired by [17], we introduce a novel dynamic structure composed of a doubly linked info table and a location array in our auditing protocol, making it substantially more effective....
[...]
...For verification, the auditor will simply check whether e( ∏ i∈Q h(mi ), v) = e(σ, g) holds, where Q is the set of challenged blocks and σ is the aggregated authenticator of these blocks’ BLS-HVA....
[...]
...Proof: This theorem suggests that forging an BLS-HVA is computationally infeasible....
[...]
221 citations
152 citations
102 citations
References
3,697 citations
"Dynamic-Hash-Table Based Public Aud..." refers background in this paper
...unforgeable, in that BLS short signature scheme is secure with the assumption that the CDH problem is hard in bilinear groups [17]....
[...]
2,238 citations
2,127 citations
1,859 citations
1,783 citations
"Dynamic-Hash-Table Based Public Aud..." refers background in this paper
...PoRs [8] O(1) O(c) O(c) — — 1 ð1 tÞ PDP [9] O(1) O(c) O(c) — — 1 ð1 tÞ CPDP [13] O(cþs) O(cþs) O(cþs) — — 1 ð1 tÞ s DAP [14] O(c) O(c) O(c s) O(n) O(w) 1 ð1 tÞ s DPDP(skip list) [15] cO(logn) cO(logn) cO(logn) wO(logn) wO(logn) 1 ð1 tÞ DPDP(MHT) [6] cO(logn) cO(logn) cO(logn) wO(logn) wO(logn) 1 ð1 tÞ IHT-PA [16] O(cþs) O(cþs) O(cþs) O(n) O(w) 1 ð1 tÞ s DHT-PA O(c) O(c) O(c) (O(c s)) O(w) O(w) 1 ð1 tÞð1 ð1 tÞ Þ...
[...]
...[8] in 2007, which can check the correctness of data stored on the CSP and ensure data’s retrievability with the use of errorcorrecting code....
[...]
...[8], in which the verification operation is performed directly between data owners and CSPs with relatively low cost....
[...]