Skip to main content

Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation

  • Conference paper
Recent Trends in Computer Networks and Distributed Systems Security (SNDS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 335))

  • 1378 Accesses

Abstract

Cloud computing paradigm provides computing and storage infrastructure for the clients to outsource their data and computation. This new computing paradigm poses several security challenges. We focus on the problem of checking the possession of data by the untrusted cloud storage server. We design publicly auditable provable data possession scheme using polynomial interpolation technique. In our scheme, the client can delegate the task of verification to the Third Party Auditor. Interestingly, the client will not use any secret to compute the public metadata and client or Third Party Auditor need not to maintain any metadata for the verification of the proof. The verifier can verify the proof using public metadata and a random key kept secret for the challenge. We have focused on reducing the size of the proof returned by the cloud server to save the network bandwidth. We have defined the security and proved the security of the scheme under the group satisfying Computational Diffie Hellman assumption against a cheating cloud server. In the proposed scheme, the verifier can make unlimited number of data possession challenges to the server.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: A break in the clouds: towards a cloud definition. ACM SIGCOMM Computer Communication Review 39, 50–55 (2009)

    Article  Google Scholar 

  2. Amazon Elastic Compute Cloud (Amazon EC2), http://aws.amazon.com/ec2/

  3. Microsoft Windows Azure Platform, http://www.microsoft.com/windowsazure

  4. Chang, E.-C., Xu, J.: Remote Integrity Check with Dishonest Storage Server. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 223–237. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy preserving public auditing for data storage security in cloud computing. In: 29th Conference on Information Communications, pp. 525–533 (2010)

    Google Scholar 

  6. Juels, A., Kaliski, B.S.: POR: Proofs of Retrievability for Large Files. In: 14th ACM Conference on Computer and Communication Security, pp. 584–597 (2007)

    Google Scholar 

  7. Bowers, K.D., Juels, A., Oprea, A.: Proofs of Retrievability: Theory and Implementation: Report 2008/175, Cryptology ePrint Archive (2008)

    Google Scholar 

  8. Ateniese, G., Di Piotro, R., Mancini, L.F., Tsudik, G.: Scalable and efficient provable data possession. In: 4th International Conference on Security and Privacy in Communication Networks, pp. 1–10 (2008)

    Google Scholar 

  9. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: 14th ACM Conference on Computer and Communications Security, pp. 598–609 (2007)

    Google Scholar 

  10. Lidl, R., Niederreiter, H.: Introduction to finite fields and their applications. Press Syndicate of the University of Cambridge, Cambridge Britain (1986)

    MATH  Google Scholar 

  11. Delfs, H., Knebl, H.: Introduction to Cryptography, Principles and Applications. Springer, Heidelberg (2007)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Purushothama, B.R., Amberker, B.B. (2012). Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34135-9_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34134-2

  • Online ISBN: 978-3-642-34135-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics