Skip to main content

POR-2P: Network Coding-Based POR for Data Provision-Payment System

  • Conference paper
  • First Online:
  • 1009 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9572))

Abstract

Proof Of Retrievability (POR) is a protocol that supports a data owner to check whether the data stored in cloud servers is available, intact and retrievable. Based on the POR, network coding technique has been applied to increase efficiency and throughput in data transmission and data repair. Although many network coding-based PORs have been proposed, most of them have not considered a practical scenario in which not only the data owner can check and can retrieve the data stored in the untrusted servers, but also an untrusted user can check and can retrieve the data stored in the servers without learning the secret keys of the data owner. This scenario occurs commonly in reality. For instance, in a data provision-payment system, the user must pay money to get data stored in the servers. In this paper, we propose a new network coding-based POR, named POR-2P (a network coding-based POR for data Provision-Payment system), to deal with this scenario. Furthermore, the complexity analysis and the performance evaluation show that the POR-2P is very efficient and applicable for a real cloud system.

This study is partly supported by Grant-in-Aid for Young Scientists (B) (25730083).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Juels, A., Kaliski, B.: PORs: Proofs of retrievability for large files. In: Proceedings of 14th ACM Conference on Computer and Communications Security - CCS 2007, pp. 584–597 (2007)

    Google Scholar 

  2. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  3. Bowers, K., Juels, A., Oprea, A.: Proofs of retrievability: theory and implementation. In: Proceedings of Workshop on Cloud Computing Security - CCSW 2009, pp. 43–54 (2009)

    Google Scholar 

  4. Bolosky, W.J., Douceur, J.R., Ely, D., Theimer, M.: Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs. In: Proceedings of ACM Conference on Measurement and Modeling of Computation Systems - SIGMETRICS 2000, pp. 34–43 (2000)

    Google Scholar 

  5. Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: multiple-replica provable data possession. In: Proceedings of 28th Conference on Distributed Computing Systems, pp. 411–420 (2008)

    Google Scholar 

  6. Aguilera, M.K., Janakiraman, R., Xu, L.: Efficient fault-tolerant distributed storage using erasure codes, Technical report. Washington University in St. Louis (2004)

    Google Scholar 

  7. Bowers, K., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of 16th ACM Conference on Computer and Communications Security - CCS 2009, pp. 187–198 (2009)

    Google Scholar 

  8. Shi, E., Stefanov, E., Papamanthou, C.: Practical dynamic proofs of retrievability. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security - CCS 2013, pp. 325–336 (2013)

    Google Scholar 

  9. Cash, D., Küpçü, A., Wichs, D.: Dynamic proofs of retrievability via oblivious RAM. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 279–295. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  10. Ahlswede, R., Cai, N., Li, S., Yeung, R.: Network information flow. IEEE Trans. Inf. Theor. 46(4), 1204–1216 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  11. Li, S.Y.R., Yeung, R.W., Cai, N.: Linear network coding. IEEE Trans. Inf. Theor. 49(2), 371–381 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  12. Dimakis, A., Godfrey, P., Wu, Y., Wainwright, M., Ramchandran, K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theor. 56(9), 4539–4551 (2010)

    Article  Google Scholar 

  13. Acedanski, S., Deb, S., Medard, M., Koetter, R.: How good is random linear coding based distributed networked storage? In: Workshop on Network Coding, Theory and Applications - NETCOD 2005 (2005)

    Google Scholar 

  14. Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292–305. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  15. Cheng, C., Jiang, T.: An efficient homomorphic MAC with small key size for authentication in network coding. IEEE Trans. Comput. 62(10), 2096–2100 (2012)

    Article  MathSciNet  Google Scholar 

  16. Cheng, C., Jiang, T., Zhang, Q.: TESLA-based homomorphic MAC for authentication in P2P system for live streaming with network coding. IEEE J. Sel. Areas Commun. 31(9), 291–298 (2013)

    Article  Google Scholar 

  17. Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  18. Freeman, D.M.: Improved security for linearly homomorphic signatures: a generic framework. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 697–714. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  19. Li, J., Yang, S., Wang, X., Xue, X., Li, B.: Tree-structured Data Regeneration in Distributed Storage Systems with Network Coding. In: Proceedings of 29th Conference on Information Communications - INFOCOM 2010, pp. 2892–2900 (2010)

    Google Scholar 

  20. Chen, B., Curtmola, R., Ateniese, G., Burns, R.: Remote data checking for network coding-based distributed storage systems. In: Proceedings of ACM Cloud Computing Security Workshop - CCSW 2010, pp. 31–42 (2010)

    Google Scholar 

  21. Chen, H.C.H., Hu, Y., Lee, P.P.C., Tang, Y.: NCCloud: a network-coding-based storage system in a cloud-of-clouds. IEEE Trans. Comput. 63(1), 31–44 (2014)

    Article  MathSciNet  Google Scholar 

  22. Le, A., Markopoulou, A.: NC-Audit: auditing for network coding storage. In: International Symposium on Network Coding - NetCod 2012, pp. 155–160 (2012)

    Google Scholar 

  23. Omote, K., Thao, T.P.: MD-POR: Multi-source and direct repair for network coding-based proof of retrievability. Int. J. Distrib. Sens. Network. (IJDSN) 2015, 14 (2015). Article ID: 586720

    MATH  Google Scholar 

  24. Yan, W., Yang, M., Li, L., Fang, H.: Short signature scheme for multi-source network coding. Comput. Commun. 35(3), 344–351 (2012)

    Article  Google Scholar 

  25. Koetter, R., Medard, M.: An algebraic approach to network coding. IEEE/ACM Trans. Network. 11(5), 782–795 (2003)

    Article  Google Scholar 

  26. Le, A., Markopoulou, A.: On detecting pollution attacks in inter-session network coding. In: Proceedings of 31st IEEE Conference on Computer Communications - INFOCOM 2012, pp. 343–351 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tran Phuong Thao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Omote, K., Thao, T.P. (2016). POR-2P: Network Coding-Based POR for Data Provision-Payment System. In: Lambrinoudakis, C., Gabillon, A. (eds) Risks and Security of Internet and Systems. CRiSIS 2015. Lecture Notes in Computer Science(), vol 9572. Springer, Cham. https://doi.org/10.1007/978-3-319-31811-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31811-0_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31810-3

  • Online ISBN: 978-3-319-31811-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics