TY - GEN
T1 - Accountable storage
AU - Ateniese, Giuseppe
AU - Goodrich, Michael T.
AU - Lekakis, Vassilios
AU - Papamanthou, Charalampos
AU - Paraskevas, Evripidis
AU - Tamassia, Roberto
N1 - Publisher Copyright:
© Springer International Publishing AG 2017.
PY - 2017
Y1 - 2017
N2 - We introduce Accountable Storage (AS), a framework enabling a client to outsource n file blocks to a server while being able (any time after outsourcing) to provably compute how many bits were discarded or corrupted by the server. Existing techniques (e.g., proofs of data possession or storage) can address the accountable storage problem, with linear server computation and bandwidth. Instead, our optimized protocols achieve O(δ log n) complexity (where δ is the maximum number of corrupted blocks that can be tolerated) through the novel use of invertible Bloom filters and a new primitive called proofs of partial storage. With accountable storage, a client can be compensated with a dollar amount proportional to the number d of corrupted bits (that he can now provably compute). We integrate our protocol with Bitcoin, supporting automatic such compensations. Our implementation is open-source and shows our protocols perform well in practice.
AB - We introduce Accountable Storage (AS), a framework enabling a client to outsource n file blocks to a server while being able (any time after outsourcing) to provably compute how many bits were discarded or corrupted by the server. Existing techniques (e.g., proofs of data possession or storage) can address the accountable storage problem, with linear server computation and bandwidth. Instead, our optimized protocols achieve O(δ log n) complexity (where δ is the maximum number of corrupted blocks that can be tolerated) through the novel use of invertible Bloom filters and a new primitive called proofs of partial storage. With accountable storage, a client can be compensated with a dollar amount proportional to the number d of corrupted bits (that he can now provably compute). We integrate our protocol with Bitcoin, supporting automatic such compensations. Our implementation is open-source and shows our protocols perform well in practice.
UR - http://www.scopus.com/inward/record.url?scp=85022333337&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85022333337&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-61204-1_31
DO - 10.1007/978-3-319-61204-1_31
M3 - Conference contribution
AN - SCOPUS:85022333337
SN - 9783319612034
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 623
EP - 644
BT - Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings
A2 - Gollmann, Dieter
A2 - Miyaji, Atsuko
A2 - Kikuchi, Hiroaki
T2 - 15th International Conference on Applied Cryptography and Network Security, ACNS 2017
Y2 - 10 July 2017 through 12 July 2017
ER -