Remote Data Integrity Checking Protocols from homomorphic hash functions

Remote Data Integrity Checking Protocol (RDC) is an interactive protocol allowing a client to verify that a storage service provider (SSP) faithfully stores a file. Existing protocols are mainly built from homomorphic identification protocols. In this paper, we first present a RDC protocol (HH-RDC) from a homomorphic hash function. The key technique is treating the file as a set of integers other than elements in some large field in previous protocol. The proposed protocol support public verifiability, data dynamic and privacy against verifiers. We then present a variant (V-HH-RDC) of HH-RDC by fixing and simplifying some parameters. Compared with HH-RDC, V-HH-RDC obtains a significant improvement in computation and communication at the sacrifice of losing feature of public verifiability. V-HH-RDC is very suitable for low-power devices, such as cell phones. After that, theoretical analysis and experimental results show that the proposed protocols have good performances.

[1]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[2]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[3]  Reza Curtmola,et al.  Remote data checking using provable data possession , 2011, TSEC.

[4]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[5]  Yevgeniy Dodis,et al.  Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..

[6]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, ASIACRYPT.

[7]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[8]  Nenghai Yu,et al.  A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability , 2010, 2010 Second International Symposium on Data, Privacy, and E-Commerce.

[9]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[10]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[11]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[12]  Roberto Tamassia,et al.  Authenticated Data Structures , 2003, ESA.

[13]  Reza Curtmola,et al.  MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[14]  Jonathan Katz,et al.  Secure Network Coding Over the Integers , 2010, IACR Cryptol. ePrint Arch..