Proof of Storage-Time: Efficiently Checking Continuous Data Availability

被引:24
作者
Ateniese, Giuseppe [1 ]
Chen, Long [2 ]
Etemad, Mohammard [1 ]
Tang, Qiang [2 ]
机构
[1] Stevens Inst Technol, Hoboken, NJ 07030 USA
[2] New Jersey Inst Technol, Newark, NJ 07102 USA
来源
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) | 2020年
关键词
SPACE;
D O I
10.14722/ndss.2020.24427
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A high-quality outsourced storage service is crucial for many existing applications. For example, hospitals and data centers need to guarantee the availability of their systems to perform routine daily activities. Such a system should protect users against downtime and ensure data availability over time. Continuous data availability is a critical property to measure the quality of an outsourced storage service, which implies that outsourced data is continuously available to the server during the entire storage period. We formally study the Proof of Storage-Time (PoSt), the notion initially proposed in the Filecoin whitepaper, which enables a verifier to audit the continuous data availability of an outsourced storage service. We provide a formal security model of PoSt and generic constructions that are proven secure under our definition. Moreover, our concrete instantiation can yield a PoSt protocol with an extremely efficient verification: a single hash computation to verify a proof of size around 200 bits. This makes our scheme applicable even in the decentralized storage marketplace enabled by blockchain.
引用
收藏
页数:15
相关论文
共 50 条
[1]   Sustained Space Complexity [J].
Alwen, Joel ;
Blocki, Jeremiah ;
Pietrzak, Krzysztof .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 :99-130
[2]  
[Anonymous], TENCENT CLOUD USER C
[3]  
[Anonymous], 2018, Filecoin: A decentralized storage network
[4]   Outsourced Proofs of Retrievability [J].
Armknecht, Frederik ;
Bohli, Jens-Matthias ;
Karame, Ghassan O. ;
Liu, Zongren ;
Reuter, Christian A. .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :831-843
[5]  
Armknecht F, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P1051
[6]  
Ateniese Giuseppe, 2014, Security and Cryptography for Networks. 9th International Conference (SCN 2014). Proceedings: LNCS 8642, P538, DOI 10.1007/978-3-319-10879-7_31
[7]  
Ateniese G, 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
[8]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[9]   Remote Data Checking Using Provable Data Possession [J].
Ateniese, Giuseppe ;
Burns, Randal ;
Curtmola, Reza ;
Herring, Joseph ;
Khan, Osama ;
Kissner, Lea ;
Peterson, Zachary ;
Song, Dawn .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
[10]  
Beaton T., 2017, TOP 10 HEALTHCARE MO