skip to main content
10.1145/3201595.3201600acmconferencesArticle/Chapter ViewAbstractPublication PagessccConference Proceedingsconference-collections
research-article

POROS: Proof of Data Reliability for Outsourced Storage

Published: 23 May 2018 Publication History

Abstract

We introduce POROS that is a new solution for proof of data reliability. In addition to the integrity of the data outsourced to a cloud storage system, proof of data reliability assures the customers that the cloud storage provider (CSP) has provisioned sufficient amounts of redundant information along with original data segments to be able to guarantee the maintenance of the data in the face of corruption. In spite of meeting a basic service requirement, the placement of the data repair capability at the CSP raises a challenging issue with respect to the design of a proof of data reliability scheme. Existing schemes like Proof of Data Possession (PDP) and Proof of Retrievability (PoR) fall short of providing proof of data reliability to customers, since those schemes are not designed to audit the redundancy mechanisms of the CSP. Thus, in addition to verifying the possession of the original data segments, a proof of data reliability scheme must also assure that sufficient redundancy information is kept at storage. Thanks to some combination of PDP with time constrained operations, POROS guarantees that a rationale CSP would not compute redundancy information on demand upon proof of data reliability requests but instead would store it at rest. As a result of bestowing the CSP with the repair function, POROS allows for the automatic maintenance of data by the storage provider without any interaction with the customers.

References

[1]
Shweta Agrawal and Dan Boneh. 2009. Homomorphic MACs: MAC-Based Integrity for Network Coding Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09). 292--305.
[2]
Frederik Armknecht, Ludovic Barman, Jens-Matthias Bohli, and Ghassan O. Karame. 2016. Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud 25th USENIX Security Symposium (USENIX Security 16). Austin, TX, 1051--1068.
[3]
Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, and Dawn Song. 2007. Provable data possession at untrusted stores. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). 598--609.
[4]
M. Azraoui, K. Elkhiyaoui, R. Molva, and M. Önen. 2014. StealthGuard: Proofs of Retrievability with Hidden Watchdogs Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS). 239--256.
[5]
Ayad F. Barsoum and M. Anwar Hasan. 2012. Integrity Verification of Multiple Data Copies over Untrusted Cloud Servers Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (Ccgrid 2012) (CCGRID '12). 829--834.
[6]
Ayad F. Barsoum and M. Anwar Hasan. 2015. Provable multicopy dynamic data possession in cloud computing systems. IEEE Transactions on Information Forensics and Security Vol. 10, 3 (2015), 485--497.
[7]
M. Blaum, J. Brady, J. Bruck, and J. Menon. 1994. EVENODD: An Optimal Scheme for Tolerating Double Disk Failures in RAID Architectures. In Proceedings of the 21st Annual International Symposium on Computer Architecture (ISCA '94). 245--254.
[8]
Kevin D. Bowers, Ari Juels, and Alina Oprea. 2009. HAIL: A High-availability and Integrity Layer for Cloud Storage Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS). 187--198.
[9]
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest. 2011. How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11). 501--514.
[10]
Bo Chen, Anil Kumar Ammula, and Reza Curtmola. 2015. Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY '15). 281--288.
[11]
Bo Chen, Reza Curtmola, Giuseppe Ateniese, and Randal Burns. 2010. Remote Data Checking for Network Coding-based Distributed Storage Systems Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop (CCSW '10). 31--42.
[12]
Reza Curtmola, Osama Khan, Randal C. Burns, and Giuseppe Ateniese. 2008. MR-PDP:Multiple-Replica ProvableDataPossession. In ICDCS. 411--420.
[13]
Kaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, and Refik Molva. 2016. Efficient Techniques for Publicly Verifiable Delegation of Computation Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS '16). 119--128.
[14]
Chris Erway, Alptekin Küpccü, Charalampos Papamanthou, and Roberto Tamassia. 2009. Dynamic Provable Data Possession. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09). 213--222.
[15]
Mohammad Etemad and Alptekin Küpccü. 2013. Transparent, Distributed, and Replicated Dynamic Provable Data Possession Proceedings of the 11th International Conference on Applied Cryptography and Network Security (ACNS'13). 1--18.
[16]
Dario Fiore and Rosario Gennaro. 2012. Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS '12). 501--512.
[17]
Ari Juels and Burton S. Kaliski, Jr. 2007. Pors: Proofs of Retrievability for Large Files. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07). 584--597.
[18]
Anh Le and Athina Markopoulou. 2012. NC-Audit: Auditing for network coding storage. In Proceedings of International Symposium on Network Coding. 155--160.
[19]
Shacham, Hovav and Waters, Brent. 2008. Compact proofs of retrievability. In Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT). 90--107.
[20]
Changho Suh and K. Ramchandran. 2011. Exact-Repair MDS Code Construction Using Interference Alignment. IEEE Trans. Inf. Theor. Vol. 57, 3 (March. 2011), 1425--1442.

Cited By

View all
  • (2022)Efficient Publicly Verifiable Proofs of Data Replication and Retrievability Applicable for Cloud StorageAdvances in Science, Technology and Engineering Systems Journal10.25046/aj0701117:1(107-124)Online publication date: Feb-2022
  • (2020)Proofs of Physical Reliability for Cloud Storage SystemsIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2019.295891931:5(1048-1065)Online publication date: 1-May-2020
  • (2020)Reliable verification of distributed encoded data fragments in the cloudJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-020-02610-xOnline publication date: 3-Nov-2020
  • Show More Cited By

Index Terms

  1. POROS: Proof of Data Reliability for Outsourced Storage

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SCC '18: Proceedings of the 6th International Workshop on Security in Cloud Computing
      May 2018
      71 pages
      ISBN:9781450357593
      DOI:10.1145/3201595
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 23 May 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. proofs of reliability
      2. reliable storage
      3. secure cloud storage
      4. verifiable storage

      Qualifiers

      • Research-article

      Conference

      ASIA CCS '18
      Sponsor:

      Acceptance Rates

      SCC '18 Paper Acceptance Rate 6 of 17 submissions, 35%;
      Overall Acceptance Rate 64 of 159 submissions, 40%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 17 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Efficient Publicly Verifiable Proofs of Data Replication and Retrievability Applicable for Cloud StorageAdvances in Science, Technology and Engineering Systems Journal10.25046/aj0701117:1(107-124)Online publication date: Feb-2022
      • (2020)Proofs of Physical Reliability for Cloud Storage SystemsIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2019.295891931:5(1048-1065)Online publication date: 1-May-2020
      • (2020)Reliable verification of distributed encoded data fragments in the cloudJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-020-02610-xOnline publication date: 3-Nov-2020
      • (2020)Deficiencies of Compliancy for Data and StorageNational Cyber Summit (NCS) Research Track 202010.1007/978-3-030-58703-1_11(170-192)Online publication date: 9-Sep-2020
      • (2020)Proofs of Data Reliability: Verification of reliable data storage with automatic maintenance†SECURITY AND PRIVACY10.1002/spy2.1376:5Online publication date: 9-Dec-2020

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media