SW-POR: A Novel POR Scheme Using Slepian-Wolf Coding for Cloud Storage

Cloud computing is a service by which the clients can outsource their data to the cloud storage server to deal with the local storage limitation. However, the cloud storage providers are untrustworthy, which can lead to several security challenges, such as data availability, data integrity, and data confidentiality. To mitigate the issues of data availability and data integrity, a novel Slepian-Wolf-based Proof of Retrievability (SW-POR) scheme is proposed to enable the client to check whether the distributed data stored in the cloud servers is intact or not. The proposed SW-POR scheme not only can obtain an optimal coded block size, but also it can provide the exact-repair feature and low complexity. In this paper, the security analysis and efficiency analysis are provided. Simulation results show that the SW-POR scheme can accomplish a significant improvement in computation time.

[1]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[2]  Tao Jiang,et al.  An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding , 2013, IEEE Transactions on Computers.

[3]  T. Ho,et al.  On Linear Network Coding , 2010 .

[4]  Nuttapong Attrapadung,et al.  Homomorphic Network Coding Signatures in the Standard Model , 2011, Public Key Cryptography.

[5]  Reza Curtmola,et al.  MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[6]  Wei Chen,et al.  BitVault: a highly reliable distributed data retention platform , 2007, OPSR.

[7]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[8]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[9]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.

[10]  Michael K. Reiter,et al.  Verifying distributed erasure-coded data , 2007, PODC '07.

[11]  David Mandell Freeman,et al.  Improved Security for Linearly Homomorphic Signatures: A Generic Framework , 2012, Public Key Cryptography.

[12]  Yang Tang,et al.  NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds , 2014, IEEE Transactions on Computers.

[13]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[14]  Dan Boneh,et al.  Homomorphic MACs: MAC-Based Integrity for Network Coding , 2009, ACNS.

[15]  Muriel Médard,et al.  An algebraic approach to network coding , 2003, TNET.

[16]  Yevgeniy Dodis,et al.  Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..

[17]  Alexandros G. Dimakis,et al.  Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[18]  Marvin Theimer,et al.  Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.

[19]  Reza Curtmola,et al.  Remote data checking for network coding-based distributed storage systems , 2010, CCSW '10.

[20]  Tao Jiang,et al.  TESLA-Based Homomorphic MAC for Authentication in P2P System for Live Streaming with Network Coding , 2013, IEEE Journal on Selected Areas in Communications.

[21]  Dawn Xiaodong Song,et al.  Homomorphic Signature Schemes , 2002, CT-RSA.