Dynamic Proofs of Retrievability from Chameleon-Hashes

被引:0
作者
Rass, Stefan [1 ]
机构
[1] Alpen Adria Univ Klagenfurt, Inst Appl Informat, Univ Str 65-67, A-9020 Klagenfurt, Austria
来源
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013) | 2013年
关键词
Cloud Storage; Proofs of Retrievability; Data Availability; Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proofs of retrievability (POR) are interactive protocols that allow a verifier to check the consistent existence and availability of data residing at a potentially untrusted storage provider, e.g., a cloud. While most POR protocols strictly refer to static files, i. e., content that is read-only, dynamic PORs shall achieve the same security guarantees (existence, consistency and the possibility to retrieve the data) for content that is subject to an unlimited number of (legitimate) modifications. This work discusses how to construct such a dynamic proof of retrievability from chameleon hashes (trapdoor commitments). Like standard POR constructions, the presented scheme is sentinel-based and does audit queries via spot checking mechanism. Unlike previous schemes, however, a-posteriori insertions of new sentinels throughout the lifetime of the file is supported. This novel feature is apparently absent in any other POR scheme in the literature. Moreover, the system is designed for compatibility with XML structured data files.
引用
收藏
页码:296 / 304
页数:9
相关论文
共 23 条
  • [1] [Anonymous], 2016, HDB APPL CRYPTOGRAPH
  • [2] [Anonymous], IACR CRYPTOLOGY EPRI
  • [3] [Anonymous], 2008, PROC 4 INT C SECUR P, DOI DOI 10.1145/1460877.1460889
  • [4] Ateniese G, 2005, LECT NOTES COMPUT SC, V3352, P165
  • [5] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [6] Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
  • [7] Bo Chen, 2012, Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P515, DOI 10.1109/ICDCSW.2012.57
  • [8] Bowers KD, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P187
  • [9] Cash D., 2012, 2012550 IACR CRYPT E
  • [10] Dodis Y, 2009, LECT NOTES COMPUT SC, V5444, P109