Ecole d'ingénieur et centre de recherche en Sciences du numérique

Dynamic provable data possession protocols with public verifiability and data privacy

Gritti, Clementine; Chen, Rongmao; Susilo, Willy; Plantard, Thomas

ISPEC 2017, 13th International Conference on Information Security Practice and Experience, 13-15 December 2017, Melbourne, Australia / Also in LNCS Vol. 10701

Cloud storage services have become accessible and used by everyone. Nevertheless, stored data are dependable on the behavior of the cloud servers, and losses and damages often occur. One solution is to regularly audit the cloud servers in order to check the integrity of the stored data. The Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy presented in ACISP'15 is a straightforward design of such solution. However, this scheme is threatened by several attacks. In this paper, we carefully recall the definition of this scheme as well as explain how its security is dramatically menaced. Moreover, we proposed two new constructions for Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy based on the scheme presented in ACISP'15, one using Index Hash Tables and one based on Merkle Hash Trees. We show that the two schemes are secure and privacy-preserving in the random oracle model.

Document Doi Bibtex

Titre:Dynamic provable data possession protocols with public verifiability and data privacy
Mots Clés:Provable Data Possession, Dynamicity, Public Verifiability, Data Privacy, Index Hash Tables, Merkle Hash Trees
Type:Conférence
Langue:English
Ville:Melbourne
Pays:AUSTRALIE
Date:
Département:Sécurité numérique
Eurecom ref:5349
Copyright: © Springer. Personal use of this material is permitted. The definitive version of this paper was published in ISPEC 2017, 13th International Conference on Information Security Practice and Experience, 13-15 December 2017, Melbourne, Australia / Also in LNCS Vol. 10701 and is available at : http://doi.org/10.1007/978-3-319-72359-4_29
Bibtex: @inproceedings{EURECOM+5349, doi = {http://doi.org/10.1007/978-3-319-72359-4_29}, year = {2017}, title = {{D}ynamic provable data possession protocols with public verifiability and data privacy}, author = {{G}ritti, {C}lementine and {C}hen, {R}ongmao and {S}usilo, {W}illy and {P}lantard, {T}homas}, booktitle = {{ISPEC} 2017, 13th {I}nternational {C}onference on {I}nformation {S}ecurity {P}ractice and {E}xperience, 13-15 {D}ecember 2017, {M}elbourne, {A}ustralia / {A}lso in {LNCS} {V}ol. 10701}, address = {{M}elbourne, {AUSTRALIE}}, month = {12}, url = {http://www.eurecom.fr/publication/5349} }
Voir aussi: