Publication:
Generic efficient dynamic proofs of retrievability

dc.contributor.departmentN/A
dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.kuauthorEtemad, Mohammad
dc.contributor.kuauthorKüpçü, Alptekin
dc.contributor.kuprofilePhD Student
dc.contributor.kuprofileFaculty Member
dc.contributor.otherDepartment of Computer Engineering
dc.contributor.schoolcollegeinstituteGraduate School of Sciences and Engineering
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.contributor.yokidN/A
dc.contributor.yokid168060
dc.date.accessioned2024-11-09T23:44:49Z
dc.date.issued2016
dc.description.abstractTogether with its great advantages, cloud storage brought many interesting security issues to our attention. Since 2007, with the first efficient storage integrity protocols Proofs of Retrievability (PoR) of Juels and Kaliski, and Provable Data Possession (PDP) of ateniese et al., many researchers worked on such protocols. the difference among PDP and PoR models were greatly debated. the first DPDP scheme was shown by Erway et al. in 2009, while the first DPoR scheme was created by Cash et al. in 2013. We show how to obtain DPoR from DPDP, PDP, and erasure codes, making us realize that even though we did not know it, we could have had a DPoR solution in 2009. We propose a general framework for constructing DPoR schemes that encapsulates known DPoR schemes as its special cases. We show practical and interesting optimizations enabling better performance than Chandran et al. and Shi et al. constructions. for the first time, we show how to obtain constant audit bandwidth for DPoR, independent of the data size, and how the client can greatly speed up updates with O (lambda root n) local storage (where n is the number of blocks, and lambda is the security parameter), which corresponds to similar to 3MB for 10GB outsourced data, and can easily be obtained in today's smart phones, let alone computers.
dc.description.indexedbyWoS
dc.description.indexedbyScopus
dc.description.openaccessYES
dc.description.publisherscopeInternational
dc.identifier.doi10.1145/2996429.2996439
dc.identifier.isbn978-1-4503-4572-9
dc.identifier.quartileN/A
dc.identifier.scopus2-s2.0-85001720202
dc.identifier.urihttp://dx.doi.org/10.1145/2996429.2996439
dc.identifier.urihttps://hdl.handle.net/20.500.14288/13732
dc.identifier.wos390888900011
dc.languageEnglish
dc.publisherassoc Computing Machinery
dc.sourceCcsw'16: Proceedings of the 2016 acm Cloud Computing Security Workshop
dc.subjectComputer science
dc.subjectTheory methods
dc.titleGeneric efficient dynamic proofs of retrievability
dc.typeConference proceeding
dspace.entity.typePublication
local.contributor.authoridN/A
local.contributor.authorid0000-0003-2099-2206
local.contributor.kuauthorEtemad, Mohammad
local.contributor.kuauthorKüpçü, Alptekin
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication.latestForDiscovery89352e43-bf09-4ef4-82f6-6f9d0174ebae

Files