Proceedings of the 4th ACM international workshop on Storage security and survivability
Scalable and efficient provable data possession
Proceedings of the 4th international conference on Security and privacy in communication netowrks
HAIL: a high-availability and integrity layer for cloud storage
Proceedings of the 16th ACM conference on Computer and communications security
Remote data checking for network coding-based distributed storage systems
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Remote data checking using provable data possession
ACM Transactions on Information and System Security (TISSEC)
How to tell if your cloud files are vulnerable to drive crashes
Proceedings of the 18th ACM conference on Computer and communications security
Delegable provable data possession for remote data in the clouds
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Integrity Verification of Multiple Data Copies over Untrusted Cloud Servers
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Robust dynamic remote data checking for public clouds
Proceedings of the 2012 ACM conference on Computer and communications security
An integrity verification scheme for multiple replicas in clouds
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
Geolocation of data in the cloud
Proceedings of the third ACM conference on Data and application security and privacy
Adaptive data protection in distributed systems
Proceedings of the third ACM conference on Data and application security and privacy
Towards self-repairing replication-based storage systems using untrusted clouds
Proceedings of the third ACM conference on Data and application security and privacy
Proof of possession for cloud storage via lagrangian interpolation techniques
NSS'12 Proceedings of the 6th international conference on Network and System Security
Efficient dynamic provable possession of remote data via balanced update trees
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Using algebraic signatures to check data possession in cloud storage
Future Generation Computer Systems
Transparent, distributed, and replicated dynamic provable data possession
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Data dynamics for remote data possession checking in cloud storage
Computers and Electrical Engineering
Hi-index | 0.00 |
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of the data are actually stored. Storage servers can collude to make it look like they are storing many copies of the data, whereas in reality they only store a single copy. We address this shortcoming through multiple-replica provable data possession (MR-PDP): A provably-secure scheme that allows a client that stores treplicas of a file in a storage system to verify through a challenge-response protocol that (1) each unique replica can be produced at the time of the challenge and that (2) the storage system uses t times the storage required to store a single replica. MR-PDP extends previous work on data possession proofs for a single copy of a file in a client/server storage system [4]. Using MR-PDP to store t replicas is computationally much more efficient than using a single-replica PDP scheme to store t separate, unrelated files (e.g., by encrypting each file separately prior to storing it). Another advantage of MR-PDP is that it can generate further replicas on demand, at little expense, when some of the existing replicas fail.