scispace - formally typeset
Journal ArticleDOI

Efficient Remote Data Possession Checking in Critical Information Infrastructures

TLDR
This paper presents a new remote data possession checking protocol that allows an unlimited number of file integrity verifications and its maximum running time can be chosen at set-up time and traded off against storage at the verifier.
Abstract
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of crucial importance. Remote data possession checking protocols permit to check that a remote server can access an uncorrupted file in such a way that the verifier does not need to know beforehand the entire file that is being verified. Unfortunately, current protocols only allow a limited number of successive verifications or are impractical from the computational point of view. In this paper, we present a new remote data possession checking protocol such that: 1) it allows an unlimited number of file integrity verifications; 2) its maximum running time can be chosen at set-up time and traded off against storage at the verifier.

read more

Citations
More filters
Posted Content

PORs: Proofs of Retrievability for Large Files

TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Journal ArticleDOI

Privacy-Preserving Public Auditing for Secure Cloud Storage

TL;DR: This paper proposes a mechanism that combines data deduplication with dynamic data operations in the privacy preserving public auditing for secure cloud storage and shows that the proposed mechanism is highly efficient and provably secure.
Journal ArticleDOI

An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing

TL;DR: This paper designs an auditing framework for cloud storage systems and proposes an efficient and privacy-preserving auditing protocol, which is efficient and provably secure in the random oracle model and extends the protocol to support the data dynamic operations.
Proceedings ArticleDOI

Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage

TL;DR: In this article, the authors proposed a mechanism that combines data deduplication with dynamic data operations in the privacy preserving public auditing for secure cloud storage, which is highly efficient and provably secure.
Journal ArticleDOI

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data

TL;DR: This paper proposes an efficient public auditing protocol with global and sampling blockless verification as well as batch auditing, where data dynamics are substantially more efficiently supported than is the case with the state of the art.
References
More filters
Posted Content

Provable Data Possession at Untrusted Stores.

TL;DR: Ateniese et al. as discussed by the authors introduced the provable data possession (PDP) model, which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it.
Posted Content

PORs: Proofs of Retrievability for Large Files

TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Proceedings ArticleDOI

Pors: proofs of retrievability for large files

TL;DR: In this article, the authors define and explore proofs of retrievability (PORs), which are a kind of cryptographic proof of knowledge (POK) that enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Proceedings ArticleDOI

The design and implementation of tripwire: a file system integrity checker

TL;DR: The design and implementation of the Tripwire tool is described, which is tool that aids UNIX system administrators and users in monitoring a designated set of files and directories for any changes, and is highly configurable.

Secure Hash Standard

TL;DR: The SHA-1 is used by both the transmitter and intended receiver of a message in computing and verifying a digital signature and whenever a secure hash algorithm is required for federal applications.
Related Papers (5)