Please use this identifier to cite or link to this item: https://doi.org/10.1145/2414456.2414503
DC FieldValue
dc.titleTowards efficient proofs of retrievability
dc.contributor.authorXu, J.
dc.contributor.authorChang, E.-C.
dc.date.accessioned2013-07-04T08:08:06Z
dc.date.available2013-07-04T08:08:06Z
dc.date.issued2012
dc.identifier.citationXu, J., Chang, E.-C. (2012). Towards efficient proofs of retrievability. ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security : 79-80. ScholarBank@NUS Repository. https://doi.org/10.1145/2414456.2414503
dc.identifier.isbn9781450313032
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/40602
dc.description.abstractProofs of Retrievability (POR) is a cryptographic formulation for remotely auditing the integrity of files stored in the cloud, without keeping a copy of the original files in local storage. In a POR scheme, a user Alice backups her data file together with some authentication data to a potentially dishonest cloud storage server Bob. Later, Alice can periodically and remotely verify the integrity of her data file using the authentication data, without retrieving back the data file. Besides security, performances in communication, storage overhead and computation are major considerations. Shacham and Waters (Asiacrypt '08) gave a fast scheme with O(sλ) bits communication cost and a factor of 1/s file size expansion where λ is the security parameter. In this paper, we incorporate a recent construction of constant size polynomial commitment scheme (Kate, Zaverucha and Goldberg, Asiacrypt '10) into Shacham and Waters scheme. The resulting scheme requires O(λ) communication bits (particularly, 920 bits if a 160 bits elliptic curve group is used or 3512 bits if a 1024 bits modulo group is used) per verification and a factor of 1/s file size expansion. Experiment results show that our proposed scheme is indeed efficient and practical. Our security proof is based on Strong Diffie-Hellman Assumption. © 2012 ACM.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/2414456.2414503
dc.sourceScopus
dc.subjectCloud storage
dc.subjectHomomorphic authentication tag
dc.subjectPolynomial commitment
dc.subjectProofs of retrievability
dc.subjectRemote data integrity check
dc.typeConference Paper
dc.contributor.departmentCOMPUTATIONAL SCIENCE
dc.description.doi10.1145/2414456.2414503
dc.description.sourcetitleASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security
dc.description.page79-80
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.