Outsourced Privately Verifiable Proofs of Retrievability via Blockchain

被引:4
作者
Cui, Hui [1 ]
Wan, Zhiguo [2 ]
Gao, Rui [3 ]
Wang, Huaqun [4 ]
机构
[1] Monash Univ, Fac IT, Clayton, Vic 3800, Australia
[2] Zhejiang Lab, Hangzhou 311121, Zhejiang, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Cyberspace Secur, Nanjing 210003, Jiangsu, Peoples R China
[4] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China
基金
中国国家自然科学基金;
关键词
Servers; Cloud computing; Blockchains; Costs; Encryption; Smart contracts; Task analysis; proofs of retrievability; integrity; private verification; PROVABLE DATA POSSESSION; DEDUPLICATION;
D O I
10.1109/TDSC.2023.3285218
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourced Proofs of Retrievability (OPoR) with private verification enables a third party verifier to periodically check cloud data on behalf of users. However, such a scheme requires the verifier to keep a copy of the user's data and generate tags for the data like the data owner. In other words, in addition to storing the data and tags from the user, the cloud server also needs to store tags uploaded by the verifier. To overcome this limitation, we propose a concrete construction of outsourced privately verifiable PoR (OPVPoR) without requiring the additional tag storage from the verifier. Furthermore, we extend the OPVPoR scheme to the multi-user setting and build a MOPVPoR scheme, where users storing the same data to the cloud server also share the tag information to further reduce the storage cost. Finally, we implement both schemes to evaluate their performance in practice.
引用
收藏
页码:1501 / 1514
页数:14
相关论文
共 33 条
  • [1] Sharing Proofs of Retrievability across Tenants
    Armknecht, Frederik
    Bohli, Jens-Matthias
    Froelicher, David
    Karame, Ghassan O.
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 275 - 287
  • [2] Outsourced Proofs of Retrievability
    Armknecht, Frederik
    Bohli, Jens-Matthias
    Karame, Ghassan O.
    Liu, Zongren
    Reuter, Christian A.
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 831 - 843
  • [3] Armknecht F, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P1051
  • [4] Ateniese G., 2008, P SECURECOMM, DOI [10.1145/1460877.1460889, DOI 10.1145/1460877.1460889]
  • [5] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [6] Interactive Message-Locked Encryption and Secure Deduplication
    Bellare, Mihir
    Keelveedhi, Sriram
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 516 - 538
  • [7] Message-Locked Encryption and Secure Deduplication
    Bellare, Mihir
    Keelveedhi, Sriram
    Ristenpart, Thomas
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 296 - 312
  • [8] Blasco J, 2014, IEEE CONF COMM NETW, P481, DOI 10.1109/CNS.2014.6997518
  • [9] Bowers KD, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P501
  • [10] Buterin V., 2014, ETHEREUM WHITE PAPER