ND-POR: A POR Based on Network Coding and Dispersal Coding

Nowadays, many individuals and organizations tend to outsource their data to a cloud storage for reducing the burden of data storage and maintenance. However, a cloud provider may be untrustworthy. The cloud thus leads to a numerous security challenges: data availability, data integrity, and data confidentiality. In this paper, we focus on data availability and data integrity because they are the prerequisites of the existence of a cloud system. The approach of this paper is the network codingbased Proof of Retrievability (POR) scheme which allows a client to check whether his/her data stored on the cloud servers are intact. Although many existing network coding-based PORs have been proposed, most of them still incur high costs in data check and data repair, and cannot prevent the small corruption attack which is a common attack in the POR scheme. This paper proposes a new network coding-based POR using the dispersal coding technique, named the ND-POR (Network coding Dispersal coding POR) to improve the efficiency in data check and data repair and to protect against the small corruption attack. key words: data integrity, data availability, proof of retrievability, network coding, dispersal coding, cloud storage

[1]  Reza Curtmola,et al.  Robust dynamic remote data checking for public clouds , 2012, CCS.

[2]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[3]  J. Baylis Error-correcting Codes , 2014 .

[4]  Reza Curtmola,et al.  Auditable Version Control Systems , 2014, NDSS.

[5]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[6]  Tran Thao Phuong,et al.  A New Efficient and Secure POR Scheme Based on Network Coding , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[7]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[8]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[9]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[10]  Alexandros G. Dimakis,et al.  Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[11]  Athina Markopoulou,et al.  NC-Audit: Auditing for network coding storage , 2012, 2012 International Symposium on Network Coding (NetCod).

[12]  Michael K. Reiter,et al.  Verifying distributed erasure-coded data , 2007, PODC '07.

[13]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[14]  Huajing Fang,et al.  Short signature scheme for multi-source network coding , 2012, Comput. Commun..

[15]  Wei Chen,et al.  BitVault: a highly reliable distributed data retention platform , 2007, OPSR.

[16]  Victor Shoup,et al.  On Fast and Provably Secure Message Authentication Based on Universal Hashing , 1996, CRYPTO.

[17]  Bogdan Warinschi,et al.  Efficient Network Coding Signatures in the Standard Model , 2012, Public Key Cryptography.

[18]  Frédéric Didier Efficient erasure decoding of Reed-Solomon codes , 2009, ArXiv.

[19]  Yang Tang,et al.  NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds , 2014, IEEE Transactions on Computers.

[20]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[21]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.

[22]  Reza Curtmola,et al.  Remote data checking for network coding-based distributed storage systems , 2010, CCSW '10.

[23]  Bart Preneel,et al.  Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms , 2008, CRYPTO.

[24]  Reza Curtmola,et al.  MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[25]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[26]  Reza Curtmola,et al.  Robust remote data checking , 2008, StorageSS '08.

[27]  Dan Boneh,et al.  Homomorphic MACs: MAC-Based Integrity for Network Coding , 2009, ACNS.

[28]  Muriel Médard,et al.  An algebraic approach to network coding , 2003, TNET.

[29]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[30]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.