Publication: Generic efficient dynamic proofs of retrievability
dc.contributor.department | N/A | |
dc.contributor.department | Department of Computer Engineering | |
dc.contributor.kuauthor | Etemad, Mohammad | |
dc.contributor.kuauthor | Küpçü, Alptekin | |
dc.contributor.kuprofile | PhD Student | |
dc.contributor.kuprofile | Faculty Member | |
dc.contributor.other | Department of Computer Engineering | |
dc.contributor.schoolcollegeinstitute | Graduate School of Sciences and Engineering | |
dc.contributor.schoolcollegeinstitute | College of Engineering | |
dc.contributor.yokid | N/A | |
dc.contributor.yokid | 168060 | |
dc.date.accessioned | 2024-11-09T23:44:49Z | |
dc.date.issued | 2016 | |
dc.description.abstract | Together with its great advantages, cloud storage brought many interesting security issues to our attention. Since 2007, with the first efficient storage integrity protocols Proofs of Retrievability (PoR) of Juels and Kaliski, and Provable Data Possession (PDP) of ateniese et al., many researchers worked on such protocols. the difference among PDP and PoR models were greatly debated. the first DPDP scheme was shown by Erway et al. in 2009, while the first DPoR scheme was created by Cash et al. in 2013. We show how to obtain DPoR from DPDP, PDP, and erasure codes, making us realize that even though we did not know it, we could have had a DPoR solution in 2009. We propose a general framework for constructing DPoR schemes that encapsulates known DPoR schemes as its special cases. We show practical and interesting optimizations enabling better performance than Chandran et al. and Shi et al. constructions. for the first time, we show how to obtain constant audit bandwidth for DPoR, independent of the data size, and how the client can greatly speed up updates with O (lambda root n) local storage (where n is the number of blocks, and lambda is the security parameter), which corresponds to similar to 3MB for 10GB outsourced data, and can easily be obtained in today's smart phones, let alone computers. | |
dc.description.indexedby | WoS | |
dc.description.indexedby | Scopus | |
dc.description.openaccess | YES | |
dc.description.publisherscope | International | |
dc.identifier.doi | 10.1145/2996429.2996439 | |
dc.identifier.isbn | 978-1-4503-4572-9 | |
dc.identifier.quartile | N/A | |
dc.identifier.scopus | 2-s2.0-85001720202 | |
dc.identifier.uri | http://dx.doi.org/10.1145/2996429.2996439 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14288/13732 | |
dc.identifier.wos | 390888900011 | |
dc.language | English | |
dc.publisher | assoc Computing Machinery | |
dc.source | Ccsw'16: Proceedings of the 2016 acm Cloud Computing Security Workshop | |
dc.subject | Computer science | |
dc.subject | Theory methods | |
dc.title | Generic efficient dynamic proofs of retrievability | |
dc.type | Conference proceeding | |
dspace.entity.type | Publication | |
local.contributor.authorid | N/A | |
local.contributor.authorid | 0000-0003-2099-2206 | |
local.contributor.kuauthor | Etemad, Mohammad | |
local.contributor.kuauthor | Küpçü, Alptekin | |
relation.isOrgUnitOfPublication | 89352e43-bf09-4ef4-82f6-6f9d0174ebae | |
relation.isOrgUnitOfPublication.latestForDiscovery | 89352e43-bf09-4ef4-82f6-6f9d0174ebae |