Proceedings of the 14th ACM Conference on Computer and Communications Security 2007
DOI: 10.1145/1315245.1315318
|View full text |Cite
|
Sign up to set email alerts
|

Provable data possession at untrusted stores

Abstract: We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs. The client maintains a constant amount of metadata to verify the proof. The challenge/response protocol transmits a small, constant amount of data, which minimizes network co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
1,873
0
6

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 1,893 publications
(1,882 citation statements)
references
References 43 publications
3
1,873
0
6
Order By: Relevance
“…The problem of proof of retrievability was first posed in [53,36], and subsequent protocols include [4,58,22]. A proof of retrievability protocol usually goes like this: after storing a (potentially large) file with the server, the client issues a query to receive an assurance that the file is still correctly stored.…”
Section: Related Workmentioning
confidence: 99%
“…The problem of proof of retrievability was first posed in [53,36], and subsequent protocols include [4,58,22]. A proof of retrievability protocol usually goes like this: after storing a (potentially large) file with the server, the client issues a query to receive an assurance that the file is still correctly stored.…”
Section: Related Workmentioning
confidence: 99%
“…In [2] authors proposed a method called Provable Data Possession (PDP) which allowed a public verifier to check the correctness of data which was being stored by the user or a client on an untrusted server. Even though, it offered high privacy for data of the user, it was good for only the static data.…”
Section: Related Workmentioning
confidence: 99%
“…This means that the entire tasks are performed by a single user. To reduce the complexities in terms of workload and time, there came the concept of public auditing called Provable Data Possession (PDP) [2] which made use of homomorphic authenticators. This method was first used to check the correctness of data, especially for data stored at an untrusted server.…”
Section: Introductionmentioning
confidence: 99%
“…The matter becomes worse if the data is spread over or moved across different legal jurisdictions (Hooper et al 2013). A new technique called Provable Data Possession (PDP) generates a probabilistic proof of data integrity based on only a small portion of the file (Ateniese et al 2007). Similarly, there is research around Proof of Retrievability (PoR) to give users assurance that, once data is stored in a public cloud, it will be eventually retrievable (Shacham & Waters 2008).…”
Section: 7mentioning
confidence: 99%