scispace - formally typeset
Open AccessDOI

Provable Data Possession (PDP) and Proofs of Retrievability (POR) of Current Big User Data

TLDR
In this article, two schemas/algorithms that allow users to check the integrity and availability of their outsourced data on untrusted data stores (i.e., third-party data storages) are reviewed.
Abstract
A growing trend over the last few years is storage outsourcing, where the concept of third-party data warehousing has become more popular. This trend prompts several interesting privacy and security issues. One of the biggest concerns with third-party data storage providers is accountability. This article, critically reviews two schemas/algorithms that allow users to check the integrity and availability of their outsourced data on untrusted data stores (i.e., third-party data storages). The reviewed schemas are provable data possession (PDP) and proofs of retrievability (POR). Both are cryptographic protocols designed to provide clients the assurance that their data are secure on the untrusted data storages. Furthermore, a conceptual framework is proposed to mitigate the weaknesses of the current storage solutions.

read more

Content maybe subject to copyright    Report

References
More filters
Journal ArticleDOI

Blockchain-Based Dynamic Provable Data Possession for Smart Cities

TL;DR: This article describes a blockchain-based PDP model to realize the decentralized outsourcing storage framework, and presents a concrete construction of decentralized PDP by using multireplica storage tricks.
Journal ArticleDOI

Outsourced dynamic provable data possession with batch update for secure cloud storage

TL;DR: An outsourced dynamic provable data possession scheme, which migrates frequent auditing task to an external auditor to reduce clients’ verification overhead, and simultaneously provides log audit mechanism with lower computation burden for clients to prevent from dishonest auditor is proposed.
Journal ArticleDOI

Research on Data Security Technology Based on Cloud Storage

Rongzhi Wang
- 01 Jan 2017 - 
TL;DR: This paper implements a secure cloud storage prototype system based on Cassandra that can provide strong data loss recovery ability, effectively resist the Byzantine fault, and has very high computation efficiency, especially in the face of large files.
Journal ArticleDOI

New provable data transfer from provable data possession and deletion for secure cloud storage

TL;DR: The integrity checking protocol of Xue et al.
Journal ArticleDOI

Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage

TL;DR: This work proposes some simple yet effective countermeasures and an improved proofs of retrievability and replication scheme, which can resist the aforesaid attacks and maintain the advantages of Mirror, such as economical bandwidth and efficient verification.