Journal ArticleDOI
Efficient Remote Data Possession Checking in Critical Information Infrastructures
Francesc Sebé,Josep Domingo-Ferrer,Antoni Martínez-Ballesté,Yves Deswarte,Jean-Jacques Quisquater +4 more
TLDR
This paper presents a new remote data possession checking protocol that allows an unlimited number of file integrity verifications and its maximum running time can be chosen at set-up time and traded off against storage at the verifier.Abstract:
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of crucial importance. Remote data possession checking protocols permit to check that a remote server can access an uncorrupted file in such a way that the verifier does not need to know beforehand the entire file that is being verified. Unfortunately, current protocols only allow a limited number of successive verifications or are impractical from the computational point of view. In this paper, we present a new remote data possession checking protocol such that: 1) it allows an unlimited number of file integrity verifications; 2) its maximum running time can be chosen at set-up time and traded off against storage at the verifier.read more
Citations
More filters
Posted Content
PORs: Proofs of Retrievability for Large Files
Ari Juels,Burton S. Kaliski +1 more
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Journal ArticleDOI
Privacy-Preserving Public Auditing for Secure Cloud Storage
TL;DR: This paper proposes a mechanism that combines data deduplication with dynamic data operations in the privacy preserving public auditing for secure cloud storage and shows that the proposed mechanism is highly efficient and provably secure.
Journal ArticleDOI
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
Kan Yang,Xiaohua Jia +1 more
TL;DR: This paper designs an auditing framework for cloud storage systems and proposes an efficient and privacy-preserving auditing protocol, which is efficient and provably secure in the random oracle model and extends the protocol to support the data dynamic operations.
Proceedings ArticleDOI
Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage
TL;DR: In this article, the authors proposed a mechanism that combines data deduplication with dynamic data operations in the privacy preserving public auditing for secure cloud storage, which is highly efficient and provably secure.
Journal ArticleDOI
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data
TL;DR: This paper proposes an efficient public auditing protocol with global and sampling blockless verification as well as batch auditing, where data dynamics are substantially more efficiently supported than is the case with the state of the art.
References
More filters
Posted Content
Provable Data Possession at Untrusted Stores.
Giuseppe Ateniese,Randal Burns,Reza Curtmola,Joseph Herring,Lea Kissner,Zachary N. J. Peterson,Dawn Song +6 more
TL;DR: Ateniese et al. as discussed by the authors introduced the provable data possession (PDP) model, which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it.
Posted Content
PORs: Proofs of Retrievability for Large Files
Ari Juels,Burton S. Kaliski +1 more
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Proceedings ArticleDOI
Pors: proofs of retrievability for large files
Ari Juels,Burton S. Kaliski +1 more
TL;DR: In this article, the authors define and explore proofs of retrievability (PORs), which are a kind of cryptographic proof of knowledge (POK) that enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Proceedings ArticleDOI
The design and implementation of tripwire: a file system integrity checker
Gene Kim,Eugene H. Spafford +1 more
TL;DR: The design and implementation of the Tripwire tool is described, which is tool that aids UNIX system administrators and users in monitoring a designated set of files and directories for any changes, and is highly configurable.
Secure Hash Standard
TL;DR: The SHA-1 is used by both the transmitter and intended receiver of a message in computing and verifying a digital signature and whenever a secure hash algorithm is required for federal applications.