Public Proofs of Data Replication and Retrievability With User-Friendly Replication

被引:3
作者
Shen, Jun [1 ]
Chen, Xiaofeng [1 ,2 ]
Huang, Xinyi [3 ]
Xiang, Yang [4 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350000, Peoples R China
[3] Hong Kong Univ Sci & Technol Guangzhou, Artificial Intelligence Thrust, Informat Hub, Guangzhou 511455, Peoples R China
[4] Swinburne Univ Technol, Sch Sci Comp & Engn Technol, Hawthorn, VIC 3122, Australia
关键词
Protocols; Cryptography; Costs; Servers; Security; Cloud computing; Mirrors; Data availability; proofs of retrievability; public verifiability; user-friendly replication; BIG DATA-STORAGE; DATA POSSESSION; CLOUD;
D O I
10.1109/TDSC.2023.3299627
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Proofs of Retrievability (PoRs) and Provable Data Possession (PDP) are efficient cryptographic solutions to monitoring the state of storage, enabling integrity verification without the necessity of retrieving data. However, such protocols fail to guarantee data availability, since it is too late for cloud clients to recover the corrupted data when notified. To remedy it, these protocols are extended to verify integrity of both the stored data and their redundant copies in the multi-replica environment. Most of the existing multi-replica PDP protocols not only consume considerable computation and bandwidth resources of clients to generate and upload replicas, but also lead economic losses to service providers due to abused replica discounts. Though the other few considered these problems and proposed some countermeasures, they imposed the linear cost of generating and uploading copy parameters on clients in replication algorithms and fail to realize public verifiability. In this article, we propose a public proofs of data replication and retrievability protocol with user-friendly replication for the first time. One distinguishable property is the simultaneous achievement of user-friendly replication and public verifiability. Specifically, we design a novel replication algorithm, which imposes nearly no computation and a constant-size communication cost on clients. Subsequently, we employ non-interactive succinct proofs to make the verification public. Furthermore, we present a comprehensive analysis and extensive experiments to demonstrate the security and efficiency of the proposed protocol.
引用
收藏
页码:2057 / 2067
页数:11
相关论文
共 36 条
[1]  
[Anonymous], 2023, Amazon S3 pricing
[2]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[3]  
Armknecht F, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P1051
[4]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[5]   Provable Multicopy Dynamic Data Possession in Cloud Computing Systems [J].
Barsoum, Ayad F. ;
Hasan, M. Anwar .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :485-497
[6]   Verifiable Delay Functions [J].
Boneh, Dan ;
Bonneau, Joseph ;
Bunz, Benedikt ;
Fisch, Ben .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 :757-788
[7]   Hosting Services on an Untrusted Cloud [J].
Boneh, Dan ;
Gupta, Divya ;
Mironov, Ilya ;
Sahai, Amit .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 :404-436
[8]  
Bowers KD, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P187
[9]  
Chen X., 2016, Ser. Synthesis Lectures on Information Security, Privacy, & Trust
[10]   Publicly Verifiable Databases With All Efficient Updating Operations [J].
Chen, Xiaofeng ;
Li, Hui ;
Li, Jin ;
Wang, Qian ;
Huang, Xinyi ;
Susilo, Willy ;
Xiang, Yang .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (12) :3729-3740