Open AccessDOI
Provable Data Possession (PDP) and Proofs of Retrievability (POR) of Current Big User Data
Ieuan Walker,Ieuan Walker,Chaminda T. E. R. Hewage,Ambikesh Jayal +3 more
- Vol. 3, Iss: 1, pp 1-9
TLDR
In this article, two schemas/algorithms that allow users to check the integrity and availability of their outsourced data on untrusted data stores (i.e., third-party data storages) are reviewed.Abstract:
A growing trend over the last few years is storage outsourcing, where the concept of third-party data warehousing has become more popular. This trend prompts several interesting privacy and security issues. One of the biggest concerns with third-party data storage providers is accountability. This article, critically reviews two schemas/algorithms that allow users to check the integrity and availability of their outsourced data on untrusted data stores (i.e., third-party data storages). The reviewed schemas are provable data possession (PDP) and proofs of retrievability (POR). Both are cryptographic protocols designed to provide clients the assurance that their data are secure on the untrusted data storages. Furthermore, a conceptual framework is proposed to mitigate the weaknesses of the current storage solutions.read more
References
More filters
Journal ArticleDOI
Blockchain-Based Dynamic Provable Data Possession for Smart Cities
TL;DR: This article describes a blockchain-based PDP model to realize the decentralized outsourcing storage framework, and presents a concrete construction of decentralized PDP by using multireplica storage tricks.
Journal ArticleDOI
Outsourced dynamic provable data possession with batch update for secure cloud storage
TL;DR: An outsourced dynamic provable data possession scheme, which migrates frequent auditing task to an external auditor to reduce clients’ verification overhead, and simultaneously provides log audit mechanism with lower computation burden for clients to prevent from dishonest auditor is proposed.
Journal ArticleDOI
Research on Data Security Technology Based on Cloud Storage
TL;DR: This paper implements a secure cloud storage prototype system based on Cassandra that can provide strong data loss recovery ability, effectively resist the Byzantine fault, and has very high computation efficiency, especially in the face of large files.
Journal ArticleDOI
New provable data transfer from provable data possession and deletion for secure cloud storage
TL;DR: The integrity checking protocol of Xue et al.
Journal ArticleDOI
Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage
TL;DR: This work proposes some simple yet effective countermeasures and an improved proofs of retrievability and replication scheme, which can resist the aforesaid attacks and maintain the advantages of Mirror, such as economical bandwidth and efficient verification.