skip to main content
10.1145/1866835.1866842acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Remote data checking for network coding-based distributed storage systems

Published: 08 October 2010 Publication History

Abstract

Remote Data Checking (RDC) is a technique by which clients can establish that data outsourced at untrusted servers remains intact over time. RDC is useful as a prevention tool, allowing clients to periodically check if data has been damaged, and as a repair tool whenever damage has been detected. Initially proposed in the context of a single server, RDC was later extended to verify data integrity in distributed storage systems that rely on replication and on erasure coding to store data redundantly at multiple servers. Recently, a technique was proposed to add redundancy based on network coding, which offers interesting tradeoffs because of its remarkably low communication overhead to repair corrupt servers.
Unlike previous work on RDC which focused on minimizing the costs of the prevention phase, we take a holistic look and initiate the investigation of RDC schemes for distributed systems that rely on network coding to minimize the combined costs of both the prevention and repair phases. We propose RDC-NC, a novel secure and efficient RDC scheme for network coding-based distributed storage systems. RDC-NC mitigates new attacks that stem from the underlying principle of network coding. The scheme is able to preserve in an adversarial setting the minimal communication overhead of the repair component achieved by network coding in a benign setting. We implement our scheme and experimentally show that it is computationally inexpensive for both clients and servers.

References

[1]
}}Reference model for an open archival information system (OAIS), 2001. Consultative Committee for Space Data Systems.
[2]
}}G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In Proc. of ACM CCS, 2007.
[3]
}}D. Boneh, D. Freeman, J. Katz, and B. Waters. Signing a linear subspace: Signature schemes for network coding. In Proc. PKC '09.
[4]
}}K. Bowers, A. Oprea, and A. Juels. HAIL: A high-availability and integrity layer for cloud storage. In Proc. of ACM CCS, 2009.
[5]
}}K. D. Bowers, A. Juels, and A. Oprea. Proofs of retrievability: Theory and implementation. In Proc. of the 2009 ACM Workshop on Cloud Computing Security (CCSW '09), 2009.
[6]
}}R. Curtmola, O. Khan, and R. Burns. Robust remote data checking. In Proc. of ACM StorageSS, 2008.
[7]
}}R. Curtmola, O. Khan, R. Burns, and G. Ateniese. MR-PDP: Multiple-replica provable data possession. In Proc. of ICDCS, 2008.
[8]
}}A. G. Dimakis, B. Godfrey, M. J. Wainwright, and K. Ramchandran. Network coding for distributed storage systems. In INFOCOM, 2007.
[9]
}}A. G. Dimakis, P. B. Godfrey, Y. Wu, M. O. Wainwright, and K. Ramchandran. Network coding for distributed storage systems. IEEE Transactions on Information Theory, 2010.
[10]
}}C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia. Dynamic provable data possession. In Proc. of ACM CCS, 2009.
[11]
}}R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin. Secure network coding over the integers. In Proc. of PKC '10, 2010.
[12]
}}T. Ho, R. Koetter, M. Medard, D. R. Karger, and M. Effros. The benefits of coding over routing in a randomized setting. In Proc. of IEEE International Symposium on Information Theory (ISIT), 2003.
[13]
}}T. Ho, M. Medard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B. Leong. A random linear network coding approach to multicast. IEEE Trans. Inform. Theory, 52(10):4413--4430, 2006.
[14]
}}Y. Jiang, Y. Fan, X. Shena, and C. Lin. A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding. Elsevier Computer Networks, August 2009.
[15]
}}A. Juels and B. S. Kaliski. PORs: Proofs of retrievability for large files. In Proc. of ACM CCS, 2007.
[16]
}}H. Krawczyk. LFSR-based hashing and authentication. In Crypto '94.
[17]
}}A. Krioukov, L. N. Bairavasundaram, G. R. Goodson, K. Srinivasan, R. Thelen, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. Parity lost and parity regained. In Proc. of FAST'08, 2008.
[18]
}}P. Maniatis, M. Roussopoulos, T. Giuli, D. Rosenthal, M. Baker, and Y. Muliadi. The LOCKSS peer-to-peer digital preservation system. ACM Transactions on Computer Systems, 23(1):2--50, 2005.
[19]
}}I. S. Reed and G. Solomon. Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2):300--304, 1960.
[20]
}}P. Rogaway. Bucket hashing and its application to fast message authentication. In Proc. of CRYPTO '95, 1995.
[21]
}}B. Schroeder, S. Damouras, and P. Gill. Understanding latent sector errors and how to protect against them. In Proc. of FAST'10, 2010.
[22]
}}H. Shacham and B. Waters. Compact proofs of retrievability. In Proc. of Asiacrypt 2008, 2008.
[23]
}}V. Shoup. On fast and provably secure message authentication based on universal hashing. In Proc. of CRYPTO '96, 1996.
[24]
}}C. Wang, Q. Wang, K. Ren, and W. Lou. Ensuring data storage security in cloud computing. In Proc. of IWQoS, 2009.
[25]
}}H. Weatherspoon and J. D. Kubiatowicz. Erasure coding vs. replication: a quantitiative comparison. In Proc. of IPTPS, 2002.
[26]
}}M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22(3):265--279, 1981.

Cited By

View all
  • (2024)A Security Information Transmission Method Based on DHR for Seafloor Observation NetworkSensors10.3390/s2404114724:4(1147)Online publication date: 9-Feb-2024
  • (2024)Toward Secure and Trustworthy Vehicular Fog Computing: A SurveyIEEE Access10.1109/ACCESS.2024.337148812(35154-35171)Online publication date: 2024
  • (2023)Protected Data Sharing using Attribute Based Encryption for Remote Data Checking in Cloud Environment2023 12th International Conference on Advanced Computing (ICoAC)10.1109/ICoAC59537.2023.10249642(1-8)Online publication date: 17-Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCSW '10: Proceedings of the 2010 ACM workshop on Cloud computing security workshop
October 2010
118 pages
ISBN:9781450300896
DOI:10.1145/1866835
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 October 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. archival storage
  2. distributed storage systems
  3. network coding
  4. pollution attack
  5. remote data checking
  6. replay attack
  7. security

Qualifiers

  • Research-article

Conference

CCS '10
Sponsor:

Acceptance Rates

Overall Acceptance Rate 37 of 108 submissions, 34%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)5
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Security Information Transmission Method Based on DHR for Seafloor Observation NetworkSensors10.3390/s2404114724:4(1147)Online publication date: 9-Feb-2024
  • (2024)Toward Secure and Trustworthy Vehicular Fog Computing: A SurveyIEEE Access10.1109/ACCESS.2024.337148812(35154-35171)Online publication date: 2024
  • (2023)Protected Data Sharing using Attribute Based Encryption for Remote Data Checking in Cloud Environment2023 12th International Conference on Advanced Computing (ICoAC)10.1109/ICoAC59537.2023.10249642(1-8)Online publication date: 17-Aug-2023
  • (2023)Blockchain-based auditing with data self-repair: From centralized system to distributed storageJournal of Systems Architecture10.1016/j.sysarc.2023.102854137(102854)Online publication date: Apr-2023
  • (2023)Data Integrity Protection Using Multi-level Reconstructive Error Data and Auditing for Cloud StorageIntelligent Data Engineering and Analytics10.1007/978-981-99-6706-3_53(595-606)Online publication date: 26-Nov-2023
  • (2022)On the Design and Implementation of the External Data Integrity Tracking and Verification System for Stream Computing System in IoTSensors10.3390/s2217649622:17(6496)Online publication date: 29-Aug-2022
  • (2022)Efficient Publicly Verifiable Proofs of Data Replication and Retrievability Applicable for Cloud StorageAdvances in Science, Technology and Engineering Systems Journal10.25046/aj0701117:1(107-124)Online publication date: Feb-2022
  • (2022)Blockchain-Based Proof of Retrievability SchemeSecurity and Communication Networks10.1155/2022/31861122022Online publication date: 1-Jan-2022
  • (2022)Challenges and future directions for security and privacy in vehicular fog computing2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)10.1109/3ICT56508.2022.9990869(693-699)Online publication date: 20-Nov-2022
  • (2021)What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud StorageInformation10.3390/info1204014212:4(142)Online publication date: 26-Mar-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media