Publication: Dynamic provable data possession
dc.contributor.coauthor | Erway, C. Chris | |
dc.contributor.coauthor | Papamanthou, Charalampos | |
dc.contributor.coauthor | Tamassia, Roberto | |
dc.contributor.department | Department of Computer Engineering | |
dc.contributor.kuauthor | Küpçü, Alptekin | |
dc.contributor.schoolcollegeinstitute | College of Engineering | |
dc.date.accessioned | 2024-11-09T23:58:03Z | |
dc.date.issued | 2015 | |
dc.description.abstract | As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the Provable Data Possession (PDP) model, the client preprocesses the data and then sends them to an untrusted server for storage while keeping a small amount of meta-data. The client later asks the server to prove that the stored data have not been tampered with or deleted (without downloading the actual data). However, existing PDP schemes apply only to static (or append-only) files. We present a definitional framework and efficient constructions for Dynamic Provable Data Possession (DPDP), which extends the PDP model to support provable updates to stored data. We use a new version of authenticated dictionaries based on rank information. The price of dynamic updates is a performance change from O(1) to O(log n) (or O(n(epsilon) log n)) for a file consisting of n blocks while maintaining the same (or better, respectively) probability of misbehavior detection. Our experiments show that this slowdown is very low in practice (e.g., 415KB proof size and 30ms computational overhead for a 1GB file). We also show how to apply our DPDP scheme to outsourced file systems and version control systems (e.g., CVS). | |
dc.description.indexedby | WOS | |
dc.description.issue | 4 | |
dc.description.openaccess | YES | |
dc.description.publisherscope | International | |
dc.description.sponsoredbyTubitakEu | N/A | |
dc.description.sponsorship | U.S. National Science Foundation [CNS-0627553, CNS-1228485, IIS-0713403, OCI-0724806] | |
dc.description.sponsorship | Center for Geometric Computing | |
dc.description.sponsorship | Kanellakis Fellowship at Brown University | |
dc.description.sponsorship | TUBITAK | |
dc.description.sponsorship | Scientific and Technological Research Council of Turkey [112E115] | |
dc.description.sponsorship | European Union COST Actions [IC1306, IC1206] | |
dc.description.sponsorship | Direct For Computer and Info Scie and Enginr | |
dc.description.sponsorship | Division of Computer and Network Systems [1514261] Funding Source: National Science Foundation | |
dc.description.sponsorship | Direct For Computer and Info Scie and Enginr | |
dc.description.sponsorship | Division of Computer and Network Systems [1228485] Funding Source: National Science Foundation A preliminary version of this work appeared in the 16th ACM Conference on Computer and Communications Security (ACM CCS 2009) [Erway et al. 2009]. Work supported in part by the U.S. National Science Foundation under grants CNS-0627553, CNS-1228485, IIS-0713403 and OCI-0724806, by a research gift from NetApp, Inc., by the Center for Geometric Computing and the Kanellakis Fellowship at Brown University, by TUBITAK, the Scientific and Technological Research Council of Turkey, under project number 112E115, and by European Union COST Actions IC1306 and IC1206. | |
dc.description.volume | 17 | |
dc.identifier.doi | 10.1145/2699909 | |
dc.identifier.eissn | 1557-7406 | |
dc.identifier.issn | 1094-9224 | |
dc.identifier.quartile | Q2 | |
dc.identifier.uri | https://doi.org/10.1145/2699909 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14288/15385 | |
dc.identifier.wos | 354046900003 | |
dc.keywords | Security | |
dc.keywords | Algorithms | |
dc.keywords | Coud storage | |
dc.keywords | Outsourced storage | |
dc.keywords | Provable data possession | |
dc.keywords | Proof of retrievability | |
dc.keywords | Secure storage | |
dc.keywords | Cloud security | |
dc.keywords | Efficient | |
dc.keywords | Proofs | |
dc.language.iso | eng | |
dc.publisher | Assoc Computing Machinery | |
dc.relation.ispartof | Acm Transactions on Information and System Security | |
dc.subject | Computer science | |
dc.subject | Information systems | |
dc.title | Dynamic provable data possession | |
dc.type | Journal Article | |
dspace.entity.type | Publication | |
local.contributor.kuauthor | Küpçü, Alptekin | |
local.publication.orgunit1 | College of Engineering | |
local.publication.orgunit2 | Department of Computer Engineering | |
relation.isOrgUnitOfPublication | 89352e43-bf09-4ef4-82f6-6f9d0174ebae | |
relation.isOrgUnitOfPublication.latestForDiscovery | 89352e43-bf09-4ef4-82f6-6f9d0174ebae | |
relation.isParentOrgUnitOfPublication | 8e756b23-2d4a-4ce8-b1b3-62c794a8c164 | |
relation.isParentOrgUnitOfPublication.latestForDiscovery | 8e756b23-2d4a-4ce8-b1b3-62c794a8c164 |