Generic Dynamic Data Outsourcing Framework for Integrity Verification

被引:10
|
作者
Etemad, Mohammad [1 ]
Kupcu, Alptekin [1 ]
机构
[1] Koc Univ, Muhendislik Fak, TR-34450 Istanbul, Turkey
关键词
Data outsourcing; dynamic provable data possession; authenticated data structures; data integrity; PROVABLE DATA POSSESSION; REVOCATION; STORAGE; PROOFS;
D O I
10.1145/3365998
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ateniese et aL proposed the Provable Data Possession (PDP) model in 2007. Following that, Erway et al. adapted the model for dynamically updatable data and called it the Dynamic Provable Data Possession (DPDP) model. The idea is that a client outsources her files to a cloud server and later challenges the server to obtain a proof of the integrity of her data. Many schemes have later been proposed for this purpose, all following a similar framework. We analyze dynamic data outsourcing schemes for the cloud regarding security and efficiency and show a general framework for constructing such schemes that encompasses existing DPDP-like schemes as different instantiations. This generalization shows that a dynamic outsourced data integrity verification scheme can be constructed given black-box access to an implicitly-ordered authenticated data structure. Moreover, for block-less verification efficiency, a homomorphic verifiable tag scheme is also needed. We investigate the requirements and conditions these building blocks should satisfy, using which one may easily check the applicability of a given building block for dynamic data outsourcing. Our framework serves as a guideline/tutoriallsurvey and enables us to provide a comparison among different building blocks that existing schemes employ.
引用
收藏
页数:32
相关论文
共 50 条
  • [1] Game-Theoretic Framework for Integrity Verification in Computation Outsourcing
    Tang, Qiang
    Pejo, Balazs
    DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 472 - 473
  • [2] A generic approach for integrity verification of big data
    Saxena, Rajat
    Dey, Somnath
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : 529 - 540
  • [3] A generic approach for integrity verification of big data
    Rajat Saxena
    Somnath Dey
    Cluster Computing, 2019, 22 : 529 - 540
  • [4] Authenticity Verification for Dynamic Social Data Outsourcing
    Yao, Xin
    Yan, Xiaoping
    Zhao, Ming
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 2325 - 2335
  • [5] Dynamic data integrity auditing for secure outsourcing in the cloud
    Wei, Jinxia
    Zhang, Ru
    Liu, Jianyi
    Li, Jing
    Niu, Xinxin
    Yao, Yuangang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (12):
  • [6] A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing
    Jang, Miyoung
    Yoon, Min
    Song, Youngho
    Chang, Jae-Woo
    Advanced Multimedia and Ubiquitous Engineering: Future Information Technology, 2015, 352 : 67 - 72
  • [7] Mahjong: A Generic Framework for Network Data Plane Verification
    Li, Yifan
    Jia, Chengjun
    Hu, Xiaohe
    Li, Jun
    PROCEEDINGS OF THE 2021 SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS '21), 2021, : 52 - 58
  • [8] An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud
    K. L. Neela
    V. Kavitha
    Wireless Personal Communications, 2022, 123 : 2431 - 2448
  • [9] An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud
    Neela, K. L.
    Kavitha, V
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (03) : 2431 - 2448
  • [10] DynaEDI: Decentralized Integrity Verification for Dynamic Edge Data
    He, Qiang
    Yang, Jiyu
    Chen, Feifei
    Tian, Cong
    Li, Yanhui
    Yang, Yun
    SERVICE-ORIENTED COMPUTING, ICSOC 2024, PT I, 2025, 15404 : 263 - 280