Remote Data Checking Using Provable Data Possession

被引:280
作者
Ateniese, Giuseppe [1 ]
Burns, Randal [1 ]
Curtmola, Reza [2 ]
Herring, Joseph [1 ]
Khan, Osama [1 ]
Kissner, Lea [3 ]
Peterson, Zachary [4 ]
Song, Dawn [5 ]
机构
[1] Johns Hopkins Univ, Dept Comp Sci, Baltimore, MD 21218 USA
[2] New Jersey Inst Technol, Dept Comp Sci, Newark, NJ 07102 USA
[3] Google Inc, Mountain View, CA 94043 USA
[4] Naval Postgrad Sch, Dept Comp Sci, Monterey, CA 93943 USA
[5] Univ Calif Berkeley, Div Comp Sci, Berkeley, CA 94720 USA
基金
美国国家科学基金会;
关键词
Security; Reliability; Performance; Remote data checking; provable data possession; PDP; homomorphic verifiable tags; archival storage; cloud storage security; robust auditing; erasure coding; PLAINTEXT-AWARE; ENCRYPTION; SIGNATURES; SCHEME; SECURE; RSA;
D O I
10.1145/1952982.1952994
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a model for provable data possession (PDP) that can be used for remote data checking: A client that has stored data at an untrusted server can verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs. The client maintains a constant amount of metadata to verify the proof. The challenge/response protocol transmits a small, constant amount of data, which minimizes network communication. Thus, the PDP model for remote data checking is lightweight and supports large data sets in distributed storage systems. The model is also robust in that it incorporates mechanisms for mitigating arbitrary amounts of data corruption. We present two provably-secure PDP schemes that are more efficient than previous solutions. In particular, the overhead at the server is low (or even constant), as opposed to linear in the size of the data. We then propose a generic transformation that adds robustness to any remote data checking scheme based on spot checking. Experiments using our implementation verify the practicality of PDP and reveal that the performance of PDP is bounded by disk I/O and not by cryptographic computation. Finally, we conduct an in-depth experimental evaluation to study the tradeoffs in performance, security, and space overheads when adding robustness to a remote data checking scheme.
引用
收藏
页数:34
相关论文
共 56 条
[41]  
DAMGARD I, 1992, LECT NOTES COMPUT SC, V576, P445
[42]  
Dent AW, 2006, LECT NOTES COMPUT SC, V4004, P289
[43]  
Deswarte Y., 2003, P WORK C INT INT CON, P1
[44]  
FIAT A, 1990, LECT NOTES COMPUT SC, V435, P175
[45]  
Golle P, 2003, LECT NOTES COMPUT SC, V2357, P120
[46]   Batch verifying multiple RSA digital signatures [J].
Harn, L .
ELECTRONICS LETTERS, 1998, 34 (12) :1219-1220
[47]  
KALLAHALLA M, 2003, P 2 USENIX C FIL STO
[48]   HMQV: A high-performance secure Diffle-Hellman protocol [J].
Krawczyk, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 :546-566
[49]  
Li Jinyuan, 2004, P 6 C S OP SYST DES, V6
[50]   The LOCKSS peer-to-peer digital preservation system [J].
Maniatis, P ;
Roussopoulos, M ;
Giuli, TJ ;
Rosenthal, DSH ;
Baker, M .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2005, 23 (01) :2-50