About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
4th International ICST Conference on Security and Privacy in Communication Networks

Research Article

Scalable and Efficient Provable Data Possession

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1145/1460877.1460889,
        author={Giuseppe Ateniese and Roberto Di Pietro and Luigi V. Mancini and Gene Tsudik},
        title={Scalable and Efficient Provable Data Possession},
        proceedings={4th International ICST Conference on Security and Privacy in Communication Networks},
        publisher={ACM},
        proceedings_a={SECURECOMM},
        year={2008},
        month={9},
        keywords={Provable data possession probabilistic algorithm archival storage storage update storage security.},
        doi={10.1145/1460877.1460889}
    }
    
  • Giuseppe Ateniese
    Roberto Di Pietro
    Luigi V. Mancini
    Gene Tsudik
    Year: 2008
    Scalable and Efficient Provable Data Possession
    SECURECOMM
    ACM
    DOI: 10.1145/1460877.1460889
Giuseppe Ateniese1,*, Roberto Di Pietro2,*, Luigi V. Mancini3,*, Gene Tsudik4,*
  • 1: The Johns Hopkins University Department of Computer Science
  • 2: UNESCO Chair in Data Privacy Universitat Rovira i Virgili
  • 3: Universita di Roma ”La Sapienza” Dipartimento di Informatica
  • 4: University of California Irvine Department of Computer Science
*Contact email: ateniese@cs.jhu.edu, roberto.dipietro@urv.cat, mancini@di.uniroma1.it, gts@ics.uci.edu

Abstract

Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively investigated in the past. However, Provable Data Possession (PDP) is a topic that has only recently appeared in the research literature. The main issue is how to frequently, efficiently and securely verify that a storage server is faithfully storing its client’s (potentially very large) outsourced data. The storage server is assumed to be untrusted in terms of both security and reliability. (In other words, it might maliciously or accidentally erase hosted data; it might also relegate it to slow or off-line storage.) The problem is exacerbated by the client being a small computing device with limited resources. Prior work has addressed this problem using either public key cryptography or requiring the client to outsource its data in encrypted form. In this paper, we construct a highly efficient and provably secure PDP technique based entirely on symmetric key cryptography, while not requiring any bulk encryption. Also, in contrast with its predecessors, our PDP technique allows outsourcing of dynamic data, i.e, it efficiently supports operations, such as block modification, deletion and append.

Keywords
Provable data possession probabilistic algorithm archival storage storage update storage security.
Published
2008-09-25
Publisher
ACM
Modified
2010-05-16
http://dx.doi.org/10.1145/1460877.1460889
Copyright © 2008–2025 ACM
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL