|Table of Contents|

Method for provable data possession under distributed storage system


Research Field:
Publishing date:


Method for provable data possession under distributed storage system
Liu Huixia
Department of Information Security,Henan Police College,Zhengzhou 450046,China
erasure codes regenerating codes provable data possession distributed storage system repair bandwidth
In order to prove the data possession in the distributed storage systems and keep low repair bandwidth,this paper proposes a provable data possession algorithm based on regenerating codes.This scheme uses the regenerating codes to prove the data possession,and to prove the data possession a second time in repair phase for resisting the pollution attacks.The theoretical analysis shows that this scheme not only maintains the advantages of regenerating codes on low repair bandwidth,but also reduces the computational overhead and saves storage space compared with the classical scheme.Security proof is also provided in this paper showing that this scheme is feasible.


[1] Amazon.Amazon simple storage service.http://s3.amazonaws.com,2012.
Fu Wei,Ye Qing,Chen Zemao.Survey of data possession provability proving on cloud storage[J].Journal on Communications,2012(z2):201-206.
[3]Juels A,Kaliski J,Burton S.PORs:Proofs of retrievability for large files[A].Proceedings of the 14th ACM Conference on Computer and Communications Security[C].Alexandria,USA:ACM,2007:584-597.
[4]Bowers K D,Ari J,Alina O.Proofs of retrievability:theory and implementation[A].Proceedings of the 2009 ACM Workshop on Cloud Computing Security[C].Chicago,USA:ACM,2009:43-54.
[5]Shacham H,Brent W.Compact proofs of retrievability[A].Advances in Cryptology-ASIACRYPT 2008[C].Berlin:Springer,2008:90-107.
[6]Zheng Qingji,Xu Shouhua.Fair and dynamic proofs of retrievability[A].Proceedings of the First ACM Conference on Data and Application Security and Privacy[C].San Antonio,USA:ACM,2011:237-248.
[7]Cash D,Alptekin K,Daniel W.Dynamic proofs of retrievability via oblivious ram[A].Advances in Cryptology-EUROCRYPT 2013[C].Berlin:Springer Berlin Heidelberg,2013:279-295.
Chen Lanxiang.A homomorphic hashing based provable data possession[J].Journal of Electronics & Information Technology,2011,33(9):2199-2204.
[9]Bowers K D,Juels A,Oprea A.HAIL:a high-availability and integrity layer for cloud storage[A].Proceedings of the 16th ACM Conference on Computer and Communications Security[C].Chicago,USA:ACM,2009:87-198.
[10]Ateniese G,Burns R,Curtmola R,et al.Remote data checking using provable data possession[J].ACM Transactions on Information and System Security(TISSEC),2011,14(1):12.
[11]Curtmola R,Khan O,Burns R,et al.MR-PDP:multiple-replica provable data possession[A].Proceedings of the 28th International Conference on Distributed Computing Systems[C].New York,USA:IEEE,2008:411-420.
[12]Erway C,Papamanthou C.Dynamic provable data possession[A].Proceedings of the 16th ACM Conference on Computer and Communications Security[C].New York,USA:ACM,2009:213-222.
[13]Zhu Yan,Hu Hongxin,Ahn G J,et al.Cooperative provable data possession for integrity verification in multicloud storage[J].IEEE Transactions on Parallel and Distributed Systems,2012,23(12):2231-2244.
[14]Chen Bo,Curtmla R,Ateniese G,et al.Remote data checking for network coding-based distributed storage systems[A].Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop[C].New York,USA:ACM,2010:31-42.
[15]Alexandros G D.Network coding for distributed storage systems[A].IEEE Transactions on Information Theory[C].New York,USA:IEEE Press,2010:4539-4551.
Yu Xiangzhen,Liu Jun,Wang Qiujuan,et al.Analysis and simulation on error correcting performance of RS code in Chinese sensible code[J].Journal of Nanjing University of Science and Technology,2011,35(1):42-46.
[17]Li S Y R,Yeung R W,Cai N.Linear network coding[J].IEEE Transactions on Information Theory,2003,49(2):371-381.
Hao Jie,Lu Yanbo,Liu Xinji,et al.Survey for regenerating codes for distributed storage[J].Journal of Chongqing University of Posts and Telecommunications:Natural Science Edition,2013,25(1):30-38.
[19]Simon H.Communication systems[M].New York,USA:Wiley Publishing,2009.


Last Update: 2015-02-28