TY - GEN
T1 - Scalable and efficient provable data possession
AU - Ateniese, Giuseppe
AU - Pietro, Roberto Di
AU - Mancini, Luigi V.
AU - Tsudik, Gene
PY - 2008
Y1 - 2008
N2 - Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively investigated in the past. However, Provable Data Possession (PDP) is a topic that has only recently appeared in the research literature. The main issue is how to frequently, efficiently and securely verify that a storage server is faithfully storing its client's (potentially very large) outsourced data. The storage server is assumed to be untrusted in terms of both security and reliability. (In other words, it might maliciously or accidentally erase hosted data; it might also relegate it to slow or off-line storage.) The problem is exacerbated by the client being a small computing device with limited resources. Prior work has addressed this problem using either public key cryptography or requiring the client to outsource its data in encrypted form. In this paper, we construct a highly efficient and provably secure PDP technique based entirely on symmetric key cryptography, while not requiring any bulk encryption. Also, in contrast with its predecessors, our PDP technique allows outsourcing of dynamic data, i.e, it efficiently supports operations, such as block modification, deletion and append.
AB - Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively investigated in the past. However, Provable Data Possession (PDP) is a topic that has only recently appeared in the research literature. The main issue is how to frequently, efficiently and securely verify that a storage server is faithfully storing its client's (potentially very large) outsourced data. The storage server is assumed to be untrusted in terms of both security and reliability. (In other words, it might maliciously or accidentally erase hosted data; it might also relegate it to slow or off-line storage.) The problem is exacerbated by the client being a small computing device with limited resources. Prior work has addressed this problem using either public key cryptography or requiring the client to outsource its data in encrypted form. In this paper, we construct a highly efficient and provably secure PDP technique based entirely on symmetric key cryptography, while not requiring any bulk encryption. Also, in contrast with its predecessors, our PDP technique allows outsourcing of dynamic data, i.e, it efficiently supports operations, such as block modification, deletion and append.
KW - Archival storage
KW - Probabilistic algorithm
KW - Provable data possession
KW - Storage security
KW - Storage update
UR - http://www.scopus.com/inward/record.url?scp=70249129465&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70249129465&partnerID=8YFLogxK
U2 - 10.1145/1460877.1460889
DO - 10.1145/1460877.1460889
M3 - Conference contribution
AN - SCOPUS:70249129465
SN - 9781605582412
T3 - Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08
BT - Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08
T2 - 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08
Y2 - 22 September 2008 through 25 September 2008
ER -