Dynamic Provable Data Possession

被引:478
作者
Erway, C. Chris [1 ]
Kupcu, Alptekin [2 ]
Papamanthou, Charalampos [3 ,4 ]
Tamassia, Roberto [5 ]
机构
[1] AppNeta Inc, Boston, MA 02210 USA
[2] Koc Univ, Muhendislik Fak, TR-34450 Istanbul, Turkey
[3] Univ Maryland, ECE, College Pk, MD 20720 USA
[4] Univ Maryland, UMIACS, College Pk, MD 20720 USA
[5] Brown Univ, Dept Comp Sci, Providence, RI 02912 USA
基金
美国国家科学基金会;
关键词
Security; Algorithms; Coud storage; outsourced storage; provable data possession; proof of retrievability; secure storage; cloud security; EFFICIENT; PROOFS;
D O I
10.1145/2699909
中图分类号
TP [自动化技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the Provable Data Possession (PDP) model, the client preprocesses the data and then sends them to an untrusted server for storage while keeping a small amount of meta-data. The client later asks the server to prove that the stored data have not been tampered with or deleted (without downloading the actual data). However, existing PDP schemes apply only to static (or append-only) files. We present a definitional framework and efficient constructions for Dynamic Provable Data Possession (DPDP), which extends the PDP model to support provable updates to stored data. We use a new version of authenticated dictionaries based on rank information. The price of dynamic updates is a performance change from O(1) to O(log n) (or O(n(epsilon) log n)) for a file consisting of n blocks while maintaining the same (or better, respectively) probability of misbehavior detection. Our experiments show that this slowdown is very low in practice (e.g., 415KB proof size and 30ms computational overhead for a 1GB file). We also show how to apply our DPDP scheme to outsourced file systems and version control systems (e.g., CVS).
引用
收藏
页数:29
相关论文
共 54 条
[1]
Anagnostopoulos A., 2001, INFORM SECURITY, P379, DOI DOI 10.1007/3-540-45439-X
[2]
[Anonymous], 04429 LAAS
[3]
[Anonymous], 2006150 CRYPT EPRINT
[4]
Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI DOI 10.1145/1460877.1460889
[5]
Remote Data Checking Using Provable Data Possession [J].
Ateniese, Giuseppe ;
Burns, Randal ;
Curtmola, Reza ;
Herring, Joseph ;
Khan, Osama ;
Kissner, Lea ;
Peterson, Zachary ;
Song, Dawn .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
[6]
Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
[7]
Ateniese Giuseppe, 2014, 2014886 CRYPT EPRINT
[8]
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries [J].
Aumann, Yonatan ;
Lindell, Yehuda .
JOURNAL OF CRYPTOLOGY, 2010, 23 (02) :281-343
[9]
CHECKING THE CORRECTNESS OF MEMORIES [J].
BLUM, M ;
EVANS, W ;
GEMMELL, P ;
KANNAN, S ;
NAOR, M .
ALGORITHMICA, 1994, 12 (2-3) :225-244
[10]
Boneh D., 2001, Lecture Notes in Computer Science, P514