|Table of Contents|

Method for provable data possession under distributed storage system

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2015年01期
Page:
56-62
Research Field:
Publishing date:

Info

Title:
Method for provable data possession under distributed storage system
Author(s):
Liu Huixia
Department of Information Security,Henan Police College,Zhengzhou 450046,China
Keywords:
erasure codes regenerating codes provable data possession distributed storage system repair bandwidth
PACS:
TH16
DOI:
-
Abstract:
In order to prove the data possession in the distributed storage systems and keep low repair bandwidth,this paper proposes a provable data possession algorithm based on regenerating codes.This scheme uses the regenerating codes to prove the data possession,and to prove the data possession a second time in repair phase for resisting the pollution attacks.The theoretical analysis shows that this scheme not only maintains the advantages of regenerating codes on low repair bandwidth,but also reduces the computational overhead and saves storage space compared with the classical scheme.Security proof is also provided in this paper showing that this scheme is feasible.

References:

[1] Amazon.Amazon simple storage service.http://s3.amazonaws.com,2012.
[2]付伟,叶清,陈泽茂.云存储中的数据持有性验证研究综述[J].通信学报,2012(z2):201-206.
Fu Wei,Ye Qing,Chen Zemao.Survey of data possession provability proving on cloud storage[J].Journal on Communications,2012(z2):201-206.
[3]Juels A,Kaliski J,Burton S.PORs:Proofs of retrievability for large files[A].Proceedings of the 14th ACM Conference on Computer and Communications Security[C].Alexandria,USA:ACM,2007:584-597.
[4]Bowers K D,Ari J,Alina O.Proofs of retrievability:theory and implementation[A].Proceedings of the 2009 ACM Workshop on Cloud Computing Security[C].Chicago,USA:ACM,2009:43-54.
[5]Shacham H,Brent W.Compact proofs of retrievability[A].Advances in Cryptology-ASIACRYPT 2008[C].Berlin:Springer,2008:90-107.
[6]Zheng Qingji,Xu Shouhua.Fair and dynamic proofs of retrievability[A].Proceedings of the First ACM Conference on Data and Application Security and Privacy[C].San Antonio,USA:ACM,2011:237-248.
[7]Cash D,Alptekin K,Daniel W.Dynamic proofs of retrievability via oblivious ram[A].Advances in Cryptology-EUROCRYPT 2013[C].Berlin:Springer Berlin Heidelberg,2013:279-295.
[8]陈兰香.一种基于同态Hash的数据持有性验证方法[J].电子与信息学报,2011,33(9):2199-2204.
Chen Lanxiang.A homomorphic hashing based provable data possession[J].Journal of Electronics & Information Technology,2011,33(9):2199-2204.
[9]Bowers K D,Juels A,Oprea A.HAIL:a high-availability and integrity layer for cloud storage[A].Proceedings of the 16th ACM Conference on Computer and Communications Security[C].Chicago,USA:ACM,2009:87-198.
[10]Ateniese G,Burns R,Curtmola R,et al.Remote data checking using provable data possession[J].ACM Transactions on Information and System Security(TISSEC),2011,14(1):12.
[11]Curtmola R,Khan O,Burns R,et al.MR-PDP:multiple-replica provable data possession[A].Proceedings of the 28th International Conference on Distributed Computing Systems[C].New York,USA:IEEE,2008:411-420.
[12]Erway C,Papamanthou C.Dynamic provable data possession[A].Proceedings of the 16th ACM Conference on Computer and Communications Security[C].New York,USA:ACM,2009:213-222.
[13]Zhu Yan,Hu Hongxin,Ahn G J,et al.Cooperative provable data possession for integrity verification in multicloud storage[J].IEEE Transactions on Parallel and Distributed Systems,2012,23(12):2231-2244.
[14]Chen Bo,Curtmla R,Ateniese G,et al.Remote data checking for network coding-based distributed storage systems[A].Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop[C].New York,USA:ACM,2010:31-42.
[15]Alexandros G D.Network coding for distributed storage systems[A].IEEE Transactions on Information Theory[C].New York,USA:IEEE Press,2010:4539-4551.
[16]于湘珍,刘军,王秋娟,等.RS码在汉信码中的纠错性能分析及仿真[J].南京理工大学学报,2011,35(1):42-46.
Yu Xiangzhen,Liu Jun,Wang Qiujuan,et al.Analysis and simulation on error correcting performance of RS code in Chinese sensible code[J].Journal of Nanjing University of Science and Technology,2011,35(1):42-46.
[17]Li S Y R,Yeung R W,Cai N.Linear network coding[J].IEEE Transactions on Information Theory,2003,49(2):371-381.
[18]郝杰,逯彦博,刘鑫吉,等.分布式存储中的再生码综述[J].重庆邮电大学学报(自然科学版),2013,25(1):30-38.
Hao Jie,Lu Yanbo,Liu Xinji,et al.Survey for regenerating codes for distributed storage[J].Journal of Chongqing University of Posts and Telecommunications:Natural Science Edition,2013,25(1):30-38.
[19]Simon H.Communication systems[M].New York,USA:Wiley Publishing,2009.

Memo

Memo:
-
Last Update: 2015-02-28