Public Proofs of Data Replication and Retrievability With User-Friendly Replication

被引:3
作者
Shen, Jun [1 ]
Chen, Xiaofeng [1 ,2 ]
Huang, Xinyi [3 ]
Xiang, Yang [4 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350000, Peoples R China
[3] Hong Kong Univ Sci & Technol Guangzhou, Artificial Intelligence Thrust, Informat Hub, Guangzhou 511455, Peoples R China
[4] Swinburne Univ Technol, Sch Sci Comp & Engn Technol, Hawthorn, VIC 3122, Australia
关键词
Protocols; Cryptography; Costs; Servers; Security; Cloud computing; Mirrors; Data availability; proofs of retrievability; public verifiability; user-friendly replication; BIG DATA-STORAGE; DATA POSSESSION; CLOUD;
D O I
10.1109/TDSC.2023.3299627
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Proofs of Retrievability (PoRs) and Provable Data Possession (PDP) are efficient cryptographic solutions to monitoring the state of storage, enabling integrity verification without the necessity of retrieving data. However, such protocols fail to guarantee data availability, since it is too late for cloud clients to recover the corrupted data when notified. To remedy it, these protocols are extended to verify integrity of both the stored data and their redundant copies in the multi-replica environment. Most of the existing multi-replica PDP protocols not only consume considerable computation and bandwidth resources of clients to generate and upload replicas, but also lead economic losses to service providers due to abused replica discounts. Though the other few considered these problems and proposed some countermeasures, they imposed the linear cost of generating and uploading copy parameters on clients in replication algorithms and fail to realize public verifiability. In this article, we propose a public proofs of data replication and retrievability protocol with user-friendly replication for the first time. One distinguishable property is the simultaneous achievement of user-friendly replication and public verifiability. Specifically, we design a novel replication algorithm, which imposes nearly no computation and a constant-size communication cost on clients. Subsequently, we employ non-interactive succinct proofs to make the verification public. Furthermore, we present a comprehensive analysis and extensive experiments to demonstrate the security and efficiency of the proposed protocol.
引用
收藏
页码:2057 / 2067
页数:11
相关论文
共 36 条
[11]   MR-PDP: Multiple-Replica Provable Data Possession [J].
Curtmola, Reza ;
Khan, Osama ;
Burns, Randal ;
Ateniese, Giuseppe .
28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, :411-+
[12]  
Etemad M., 2013, P 11 INT C APPL CRYP, V7954, P1
[13]   Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage [J].
Guo, Wei ;
Qin, Sujuan ;
Lu, Jun ;
Gao, Fei ;
Jin, Zhengping ;
Wen, Qiaoyan .
COMPUTER JOURNAL, 2020, 63 (08) :1216-1230
[14]   Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems [J].
He, Debiao ;
Kumar, Neeraj ;
Zeadally, Sherali ;
Wang, Huaqun .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (03) :1232-1241
[15]  
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
[16]  
Karame GO, 2010, LECT NOTES COMPUT SC, V6345, P679, DOI 10.1007/978-3-642-15497-3_41
[17]   On the Security of Time-Lock Puzzles and Timed Commitments [J].
Katz, Jonathan ;
Loss, Julian ;
Xu, Jiayu .
THEORY OF CRYPTOGRAPHY, TCC 2020, PT III, 2020, 12552 :390-413
[18]   MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud [J].
Liu, Chang ;
Ranjan, Rajiv ;
Yang, Chi ;
Zhang, Xuyun ;
Wang, Lizhe ;
Chen, Jinjun .
IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (09) :2609-2622
[19]   Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability [J].
Liu, Yi ;
Wang, Qi ;
Yiu, Siu-Ming .
COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 :424-443
[20]   ProSAS: Proactive Security Auditing System for Clouds [J].
Majumdar, Suryadipta ;
Chawla, Gagandeep Singh ;
Alimohammadifar, Amir ;
Madi, Taous ;
Jarraya, Yosr ;
Pourzandi, Makan ;
Wang, Lingyu ;
Debbabi, Mourad .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) :2517-2534