We introduce a model for provable data possession (PDP) that can be used for remote data checking: A client that has stored data at an untrusted server can verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs. The client maintains a constant amount of metadata to verify the proof. The challenge/response protocol transmits a small, constant amount of data, which minimizes network communication. Thus, the PDP model for remote data checking is lightweight and supports large data sets in distributed storage systems. The model is also robust in that it incorporates mechanisms for mitigating arbitrary amounts of data corruption. We present two provably-secure PDP schemes that are more efficient than previous solutions. In particular, the overhead at the server is low (or even constant), as opposed to linear in the size of the data. We then propose a generic transformation that adds robustness to any remote data checking scheme based on spot checking. Experiments using our implementation verify the practicality of PDP and reveal that the performance of PDP is bounded by disk I/O and not by cryptographic computation. Finally, we conduct an in-depth experimental evaluation to study the tradeoffs in performance, security, and space overheads when adding robustness to a remote data checking scheme.

Remote Data Checking Using Provable Data Possession / Ateniese, Giuseppe; Randal, Burns; Reza, Curtmola; Joseph, Herring; Osama, Khan; Lea, Kissner; Zachary, Peterson; Dawn, Song. - In: ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY. - ISSN 1094-9224. - 14:1(2011), pp. 1-34. (Intervento presentato al convegno 13th ACM Symposium on Access Control Models and Technologies tenutosi a Estes Pk, CO nel JUN 11-13, 2008) [10.1145/1952982.1952994].

Remote Data Checking Using Provable Data Possession

ATENIESE, GIUSEPPE;
2011

Abstract

We introduce a model for provable data possession (PDP) that can be used for remote data checking: A client that has stored data at an untrusted server can verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs. The client maintains a constant amount of metadata to verify the proof. The challenge/response protocol transmits a small, constant amount of data, which minimizes network communication. Thus, the PDP model for remote data checking is lightweight and supports large data sets in distributed storage systems. The model is also robust in that it incorporates mechanisms for mitigating arbitrary amounts of data corruption. We present two provably-secure PDP schemes that are more efficient than previous solutions. In particular, the overhead at the server is low (or even constant), as opposed to linear in the size of the data. We then propose a generic transformation that adds robustness to any remote data checking scheme based on spot checking. Experiments using our implementation verify the practicality of PDP and reveal that the performance of PDP is bounded by disk I/O and not by cryptographic computation. Finally, we conduct an in-depth experimental evaluation to study the tradeoffs in performance, security, and space overheads when adding robustness to a remote data checking scheme.
2011
archival storage; cloud storage security; erasure coding; homomorphic verifiable tags; pdp; performance; provable data possession; reliability; remote data checking; robust auditing; security
01 Pubblicazione su rivista::01a Articolo in rivista
Remote Data Checking Using Provable Data Possession / Ateniese, Giuseppe; Randal, Burns; Reza, Curtmola; Joseph, Herring; Osama, Khan; Lea, Kissner; Zachary, Peterson; Dawn, Song. - In: ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY. - ISSN 1094-9224. - 14:1(2011), pp. 1-34. (Intervento presentato al convegno 13th ACM Symposium on Access Control Models and Technologies tenutosi a Estes Pk, CO nel JUN 11-13, 2008) [10.1145/1952982.1952994].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/431631
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 332
  • ???jsp.display-item.citation.isi??? 231
social impact