Dynamic Provable Data Possession with batch-update verifiability

Cloud storage security has drawn more and more concerns in Cloud Computing literatures. The Provable Data Possession (PDP) model has been defined for ensuring the integrity of files on untrusted storages. Since cloud storage is practically not only used for storing static data, the Dynamic Provable Data Possession (DPDP) model has been put forward, in which model, file content can be updated while the storage server is still able to prove the integrity and freshness of the file. In existing DPDP schemes, homomorphic MAC or signature is applied to achieve blockless verification in the course of integrity checking, whereas in the course of update verification, the verification protocol has to be performed for every single block update. In this paper, we develop a batch-update verifiable DPDP mode that verifies a batch of block updates at once to achieve efficiency. We construct our scheme by developing a variant authenticated 2-3 tree to enable data dynamics and batch-update verification. We also employ a BLS-like signature to enable public verification. The simulation shows that our batched scheme achieves great performance improvement on update verification.

[1]  Roberto Tamassia,et al.  Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures , 2007, ICICS.

[2]  Roberto Tamassia,et al.  Efficient integrity checking of untrusted network storage , 2008, StorageSS '08.

[3]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[4]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[5]  Alfred V. Aho,et al.  The Design and Analysis of Computer Algorithms , 1974 .

[6]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[7]  Roberto Tamassia,et al.  Authenticated hash tables , 2008, CCS.

[8]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[9]  Moni Naor,et al.  Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.

[10]  Ngoc Tram Anh Nguyen Fair and dynamic proofs of retrievability , 2014 .

[11]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.

[12]  Stephen S. Yau,et al.  Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.

[13]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[14]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[15]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.