2015
DOI: 10.1007/978-3-319-19848-4_5
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Optimization on FlexDPDP: A Practical Solution for Dynamic Provable Data Possession

Abstract: Abstract. Security measures, such as proving the integrity of the data, became more important with the increase in popularity of cloud data storage services. Dynamic Provable Data Possession (DPDP) was proposed in the literature to enable the cloud server to prove to the client that her data is kept intact, even in a dynamic setting where the client may update her files. Realizing that variable-sized updates are very inefficient in DPDP (in the worst case leading to uploading the whole file again), Flexible DP… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…To evaluate our SSE scheme, we implemented a prototype with the two-level efficient HADS construction [36] with Flexlist [41] at both levels of the indices, in C++ using Cashlib library. All experiments were performed on a 2.50 GHz machine with 24 cores (but using a single core), with 16 GB RAM and Ubuntu 12.04 LTS operating system.…”
Section: Discussionmentioning
confidence: 99%
“…To evaluate our SSE scheme, we implemented a prototype with the two-level efficient HADS construction [36] with Flexlist [41] at both levels of the indices, in C++ using Cashlib library. All experiments were performed on a 2.50 GHz machine with 24 cores (but using a single core), with 16 GB RAM and Ubuntu 12.04 LTS operating system.…”
Section: Discussionmentioning
confidence: 99%
“…We show that efficient DPDP schemes can be constructed given black-box access to an implicitly-ordered ADS and a homomorphic verifiable tag scheme. The existing schemes [18,45,47,20] are all specific cases of our general model.…”
Section: Our Contributionsmentioning
confidence: 99%
“…The main problem with the general framework of Ateniese et al [5] is that it does not support dynamic operations on the outsourced data. Starting with Erway et al DPDP scheme [18], many dynamic data outsourcing schemes have been proposed [45,47,20]. Almost all these schemes use a similar architecture: homomorphic verifiable tags combined with authenticated data structures (ADSs).…”
Section: Introductionmentioning
confidence: 99%
“…An extension of DPDP includes version control [10,5] where all data changes are recorded into a repository and any version of the data can be retrieved at any time. DPDP protocols with multi-update capability were suggested in [8,9]. More recently, data privacy-preserving and publicly verifiable PDP schemes were presented in [21,20,23,11,22,12].…”
Section: Related Workmentioning
confidence: 99%