Efficient remote data possession checking in critical information infrastructures

被引:188
作者
Sebe, Francesc [1 ]
Domingo-Ferrer, Josep [1 ]
Martinez-Balleste, Antoni [1 ]
Deswarte, Yves [2 ]
Quisquater, Jean-Jacques [3 ]
机构
[1] Univ Rovira & Virgili, UNESCO Chair Data Privacy, Dept Comp Engn & Math, E-43007 Tarragona, Catalonia, Spain
[2] Univ Toulouse, LAAS, CNRS, F-31077 Toulouse 4, France
[3] Catholic Univ Louvain, Dept Elect Engn, Microelect Lab, B-1348 Louvain, Belgium
关键词
infrastructure protection; database management; management of computing and information systems;
D O I
10.1109/TKDE.2007.190647
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, and so forth) is a matter of crucial importance. Remote data possession checking protocols permit checking that a remote server can access an uncorrupted file in such a way that the verifier does not need to know beforehand the entire file that is being verified. Unfortunately, current protocols only allow a limited number of successive verifications or are impractical from the computational point of view. In this paper, we present a new remote data possession checking protocol such that 1) it allows an unlimited number of file integrity verifications and 2) its maximum running time can be chosen at set-up time and traded off against storage at the verifier.
引用
收藏
页码:1034 / 1038
页数:5
相关论文
共 15 条
[1]  
Allmydata Inc, 2007, UNL ONL STOR BACK
[2]  
ATENIESE G, 2007, CRYPTOLOGY EPRING AR
[3]  
Deswarte Y., 2003, WORK C INT INT CONTR, P1
[4]  
DEVINE C, 2004, SHA 1 SOURCE CODE
[5]  
*FIPS PUB, 1995, FIPSPUB1801
[6]  
GAZZONI DL, 2006, CRYPTOLOGY EPRING AR
[7]  
Juels A, 2007, CRYPTOLOGY EPRINT AR
[8]  
KIM GH, 1994, P 2 ACM C COMP COMM, P18
[9]  
Network Technology Group, 2007, DAT VAULT OFFS DAT B
[10]  
SEBE F, 2004, 04429 LAASCNRS