Please use this identifier to cite or link to this item:
https://doi.org/10.1145/2414456.2414503
DC Field | Value | |
---|---|---|
dc.title | Towards efficient proofs of retrievability | |
dc.contributor.author | Xu, J. | |
dc.contributor.author | Chang, E.-C. | |
dc.date.accessioned | 2013-07-04T08:08:06Z | |
dc.date.available | 2013-07-04T08:08:06Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Xu, J., Chang, E.-C. (2012). Towards efficient proofs of retrievability. ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security : 79-80. ScholarBank@NUS Repository. https://doi.org/10.1145/2414456.2414503 | |
dc.identifier.isbn | 9781450313032 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/40602 | |
dc.description.abstract | Proofs of Retrievability (POR) is a cryptographic formulation for remotely auditing the integrity of files stored in the cloud, without keeping a copy of the original files in local storage. In a POR scheme, a user Alice backups her data file together with some authentication data to a potentially dishonest cloud storage server Bob. Later, Alice can periodically and remotely verify the integrity of her data file using the authentication data, without retrieving back the data file. Besides security, performances in communication, storage overhead and computation are major considerations. Shacham and Waters (Asiacrypt '08) gave a fast scheme with O(sλ) bits communication cost and a factor of 1/s file size expansion where λ is the security parameter. In this paper, we incorporate a recent construction of constant size polynomial commitment scheme (Kate, Zaverucha and Goldberg, Asiacrypt '10) into Shacham and Waters scheme. The resulting scheme requires O(λ) communication bits (particularly, 920 bits if a 160 bits elliptic curve group is used or 3512 bits if a 1024 bits modulo group is used) per verification and a factor of 1/s file size expansion. Experiment results show that our proposed scheme is indeed efficient and practical. Our security proof is based on Strong Diffie-Hellman Assumption. © 2012 ACM. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/2414456.2414503 | |
dc.source | Scopus | |
dc.subject | Cloud storage | |
dc.subject | Homomorphic authentication tag | |
dc.subject | Polynomial commitment | |
dc.subject | Proofs of retrievability | |
dc.subject | Remote data integrity check | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTATIONAL SCIENCE | |
dc.description.doi | 10.1145/2414456.2414503 | |
dc.description.sourcetitle | ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security | |
dc.description.page | 79-80 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.