PSDP: Blockchain-Based Computationally Efficient Provably Secure Data Possession

被引:0
作者
Kar, Jayaprakash [1 ]
机构
[1] LNM Inst Informat Technol, Ctr Cryptol Cybersecur & Digital Forens, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
来源
INFORMATION SYSTEMS SECURITY, ICISS 2023 | 2023年 / 14424卷
关键词
Data possession; Provable security; Cloud server; ECDSA; Blockchain;
D O I
10.1007/978-3-031-49099-6_28
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Provable Data Possession is a protocol that helps the client to verify the integrity of the data that has been stored in cloud or a remote server. It allows the client to verify that the data possessed by the server is not modified, damaged or lost i.e. the data is original in all forms without retrieving it. Probabilistic proof of possession are constructed by the model by performing random sampling to choose random blocks of data from the remote server. To verify this, client maintains a data of fixed volume. This reduces the input and output costs drastically. We have constructed an efficient and lightweight provably secure Data Possession (PSDP) using Elliptic Curve Digital Signature Algorithm (ECDSA) in the signing process in this paper.
引用
收藏
页码:459 / 468
页数:10
相关论文
共 10 条
  • [1] Ateniese G, 2008, P 4 INT C SEC PRIV C, P1
  • [2] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [3] Deswarte, 2003, INTEGRITY INTERNAL C, P1, DOI [DOI 10.1007/1-4020-7901-X_1, 10.1007/1-4020-7901-X_1]
  • [4] EPPDP: An Efficient Privacy-Preserving Data Possession With Provable Security in Cloud Storage
    Dhakad, Nandini
    Kar, Jayaprakash
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6658 - 6668
  • [5] Dynamic Provable Data Possession
    Erway, C. Chris
    Kupcu, Alptekin
    Papamanthou, Charalampos
    Tamassia, Roberto
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
  • [6] Gazzoni Filho D.L., 2006, IACR Cryptology ePrint Archive, V2006
  • [7] A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
    Hao, Zhuo
    Zhong, Sheng
    Yu, Nenghai
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (09) : 1432 - 1437
  • [8] IntegrityChain: Provable Data Possession for Decentralized Storage
    Li, Yannan
    Yu, Yong
    Chen, Ruonan
    Du, Xiaojiang
    Guizani, Mohsen
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (06) : 1205 - 1217
  • [9] Efficient remote data possession checking in critical information infrastructures
    Sebe, Francesc
    Domingo-Ferrer, Josep
    Martinez-Balleste, Antoni
    Deswarte, Yves
    Quisquater, Jean-Jacques
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2008, 20 (08) : 1034 - 1038
  • [10] Provable Data Possession with Outsourced Data Transfer
    Wang, Huaqun
    He, Debiao
    Fu, Anmin
    Li, Qi
    Wang, Qihua
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) : 1929 - 1939