A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage

被引:6
|
作者
Paterson, Maura B. [1 ]
Stinson, Douglas R. [2 ]
Upadhyay, Jalaj [2 ]
机构
[1] Birkbeck Univ London, Dept Econ Math & Stat, Malet St, London WC1E 7HX, England
[2] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Proof-of-retrievability; cloud storage; error-correcting code;
D O I
10.1515/jmc-2013-5002
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There has been considerable recent interest in "cloud storage" wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which will recover or retrieve the file given any "proving algorithm" that has a sufficiently high success probability. This paper treats proof-of-retrievability schemes in the model of unconditional security, where an adversary has unlimited computational power. In this case retrievability of the file can be modelled as error-correction in a certain code. We provide a general analytical framework for such schemes that yields exact (non-asymptotic) reductions that precisely quantify conditions for extraction to succeed as a function of the success probability of a proving algorithm, and we apply this analysis to several archetypal schemes. In addition, we provide a new methodology for the analysis of keyed POR schemes in an unconditionally secure setting, and use it to prove the security of a modified version of a scheme due to Shacham and Waters [12] under a slightly restricted attack model, thus providing the first example of a keyed POR scheme with unconditional security. We also show how classical statistical techniques can be used to evaluate whether the responses of the prover are accurate enough to permit successful extraction. Finally, we prove a new lower bound on storage and communication complexity of POR schemes.
引用
收藏
页码:183 / 216
页数:34
相关论文
共 6 条
  • [1] A Novel Secure Cloud Storage Architecture Combining Proof of Retrievability and Revocation
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 438 - 445
  • [2] Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability
    Jho, Nam-Su
    Moon, Daesung
    Youn, Taek-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (11) : 1872 - 1879
  • [3] Dynamic proof of retrievability based on public auditing for coded secure cloud storage
    El Balmany, Chawki
    Asimi, Ahmed
    Bamarouf, Mohamed
    Tbatou, Zakariae
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (27) : 39229 - 39249
  • [4] Dynamic proof of retrievability based on public auditing for coded secure cloud storage
    Chawki El Balmany
    Ahmed Asimi
    Mohamed Bamarouf
    Zakariae Tbatou
    Multimedia Tools and Applications, 2022, 81 : 39229 - 39249
  • [5] Enabling Dynamic Proof of Retrievability in Regenerating-Coding-Based Cloud Storage
    Huang, Kun
    Liu, Jian
    Xian, Ming
    Wang, Huimei
    Fu, Shaojing
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 712 - 717
  • [6] Performance Efficiency Analysis on Slepian-Wolf based Proof of Retrievability and Its Variants for Cloud Storage
    Tan, Choon Beng
    Hijazi, Mohd Hanafi Ahmad
    Lim, Yuto
    Park, Yong Jin
    Nisar, Kashif
    2018 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN ENGINEERING AND TECHNOLOGY (IICAIET), 2018, : 48 - 53