Abstract
Cloud computing paradigm provides computing and storage infrastructure for the clients to outsource their data and computation. This new computing paradigm poses several security challenges. We focus on the problem of checking the possession of data by the untrusted cloud storage server. We design publicly auditable provable data possession scheme using polynomial interpolation technique. In our scheme, the client can delegate the task of verification to the Third Party Auditor. Interestingly, the client will not use any secret to compute the public metadata and client or Third Party Auditor need not to maintain any metadata for the verification of the proof. The verifier can verify the proof using public metadata and a random key kept secret for the challenge. We have focused on reducing the size of the proof returned by the cloud server to save the network bandwidth. We have defined the security and proved the security of the scheme under the group satisfying Computational Diffie Hellman assumption against a cheating cloud server. In the proposed scheme, the verifier can make unlimited number of data possession challenges to the server.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: A break in the clouds: towards a cloud definition. ACM SIGCOMM Computer Communication Review 39, 50–55 (2009)
Amazon Elastic Compute Cloud (Amazon EC2), http://aws.amazon.com/ec2/
Microsoft Windows Azure Platform, http://www.microsoft.com/windowsazure
Chang, E.-C., Xu, J.: Remote Integrity Check with Dishonest Storage Server. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 223–237. Springer, Heidelberg (2008)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy preserving public auditing for data storage security in cloud computing. In: 29th Conference on Information Communications, pp. 525–533 (2010)
Juels, A., Kaliski, B.S.: POR: Proofs of Retrievability for Large Files. In: 14th ACM Conference on Computer and Communication Security, pp. 584–597 (2007)
Bowers, K.D., Juels, A., Oprea, A.: Proofs of Retrievability: Theory and Implementation: Report 2008/175, Cryptology ePrint Archive (2008)
Ateniese, G., Di Piotro, R., Mancini, L.F., Tsudik, G.: Scalable and efficient provable data possession. In: 4th International Conference on Security and Privacy in Communication Networks, pp. 1–10 (2008)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: 14th ACM Conference on Computer and Communications Security, pp. 598–609 (2007)
Lidl, R., Niederreiter, H.: Introduction to finite fields and their applications. Press Syndicate of the University of Cambridge, Cambridge Britain (1986)
Delfs, H., Knebl, H.: Introduction to Cryptography, Principles and Applications. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Purushothama, B.R., Amberker, B.B. (2012). Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-34135-9_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34134-2
Online ISBN: 978-3-642-34135-9
eBook Packages: Computer ScienceComputer Science (R0)