Generic Dynamic Data Outsourcing Framework for Integrity Verification

被引:10
作者
Etemad, Mohammad [1 ]
Kupcu, Alptekin [1 ]
机构
[1] Koc Univ, Muhendislik Fak, TR-34450 Istanbul, Turkey
关键词
Data outsourcing; dynamic provable data possession; authenticated data structures; data integrity; PROVABLE DATA POSSESSION; REVOCATION; STORAGE; PROOFS;
D O I
10.1145/3365998
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ateniese et aL proposed the Provable Data Possession (PDP) model in 2007. Following that, Erway et al. adapted the model for dynamically updatable data and called it the Dynamic Provable Data Possession (DPDP) model. The idea is that a client outsources her files to a cloud server and later challenges the server to obtain a proof of the integrity of her data. Many schemes have later been proposed for this purpose, all following a similar framework. We analyze dynamic data outsourcing schemes for the cloud regarding security and efficiency and show a general framework for constructing such schemes that encompasses existing DPDP-like schemes as different instantiations. This generalization shows that a dynamic outsourced data integrity verification scheme can be constructed given black-box access to an implicitly-ordered authenticated data structure. Moreover, for block-less verification efficiency, a homomorphic verifiable tag scheme is also needed. We investigate the requirements and conditions these building blocks should satisfy, using which one may easily check the applicability of a given building block for dynamic data outsourcing. Our framework serves as a guideline/tutoriallsurvey and enables us to provide a comparison among different building blocks that existing schemes employ.
引用
收藏
页数:32
相关论文
共 83 条
  • [1] ADELSONVELSKII GM, 1962, DOKL AKAD NAUK SSSR+, V146, P263
  • [2] Aho AV, 1974, The Design and Analysis of Computer Algorithms
  • [3] [Anonymous], 2013, IEEE T COMPUT, DOI DOI 10.1109/TC.2011.245
  • [4] [Anonymous], 2014, IEEE Transactions on Services Computing
  • [5] [Anonymous], 2015, J INTERNET SERV INF
  • [6] [Anonymous], 1978, FOCS
  • [7] [Anonymous], 2010, EFFICIENT CRYPTOGRAP
  • [8] Ateniese G., 2008, Proceedings of the 4th international conference on Security and privacy in communication netowrks, P1, DOI DOI 10.1145/1460877.1460889
  • [9] Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
  • [10] Ateniese Giuseppe, 2007, P ACM C COMP COMM SE