2008
DOI: 10.1007/978-3-540-89255-7_7
|View full text |Cite
|
Sign up to set email alerts
|

Compact Proofs of Retrievability

Abstract: In a proof-of-retrievability system, a data storage center must prove to a verifier that he is actually storing all of a client's data. The central challenge is to build systems that are both efficient and provably secure -that is, it should be possible to extract the client's data from any prover that passes a verification check. In this paper, we give the first proof-of-retrievability schemes with full proofs of security against arbitrary adversaries in the strongest model, that of Juels and Kaliski. Our fir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
1,177
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 1,010 publications
(1,179 citation statements)
references
References 11 publications
2
1,177
0
Order By: Relevance
“…The problem of proof of retrievability was first posed in [53,36], and subsequent protocols include [4,58,22]. A proof of retrievability protocol usually goes like this: after storing a (potentially large) file with the server, the client issues a query to receive an assurance that the file is still correctly stored.…”
Section: Related Workmentioning
confidence: 99%
“…The problem of proof of retrievability was first posed in [53,36], and subsequent protocols include [4,58,22]. A proof of retrievability protocol usually goes like this: after storing a (potentially large) file with the server, the client issues a query to receive an assurance that the file is still correctly stored.…”
Section: Related Workmentioning
confidence: 99%
“…Clouds is still under the fear of dogmatism for traditional data confidentiality, integrity, availability, and privacy issues, plus some additional attacks. Recently many works are in continuations that has served a milestone in the way to secure data integrity and storage security in cloud [8], [9], [20][21][22][23][24][25][26].…”
Section: Related Workmentioning
confidence: 99%
“…So, in year 2011 Z. hao [26] suggest a ideal system that uses the protocol based on homomorphic verification tags that are deployed to set up with few algorithms such as SigGen, GenProof, TagGen, Checkproof that can stand proof for the challenges faced in data integrity.…”
Section: Related Workmentioning
confidence: 99%
“…A new technique called Provable Data Possession (PDP) generates a probabilistic proof of data integrity based on only a small portion of the file (Ateniese et al 2007). Similarly, there is research around Proof of Retrievability (PoR) to give users assurance that, once data is stored in a public cloud, it will be eventually retrievable (Shacham & Waters 2008). Proof carrying codes (Mahajan 2007) is another mechanism through which the cloud provider can verify user applications through formal proofs.…”
Section: 7mentioning
confidence: 99%