Abstract
Proof Of Retrievability (POR) is a protocol that supports a data owner to check whether the data stored in cloud servers is available, intact and retrievable. Based on the POR, network coding technique has been applied to increase efficiency and throughput in data transmission and data repair. Although many network coding-based PORs have been proposed, most of them have not considered a practical scenario in which not only the data owner can check and can retrieve the data stored in the untrusted servers, but also an untrusted user can check and can retrieve the data stored in the servers without learning the secret keys of the data owner. This scenario occurs commonly in reality. For instance, in a data provision-payment system, the user must pay money to get data stored in the servers. In this paper, we propose a new network coding-based POR, named POR-2P (a network coding-based POR for data Provision-Payment system), to deal with this scenario. Furthermore, the complexity analysis and the performance evaluation show that the POR-2P is very efficient and applicable for a real cloud system.
This study is partly supported by Grant-in-Aid for Young Scientists (B) (25730083).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Juels, A., Kaliski, B.: PORs: Proofs of retrievability for large files. In: Proceedings of 14th ACM Conference on Computer and Communications Security - CCS 2007, pp. 584–597 (2007)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008)
Bowers, K., Juels, A., Oprea, A.: Proofs of retrievability: theory and implementation. In: Proceedings of Workshop on Cloud Computing Security - CCSW 2009, pp. 43–54 (2009)
Bolosky, W.J., Douceur, J.R., Ely, D., Theimer, M.: Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs. In: Proceedings of ACM Conference on Measurement and Modeling of Computation Systems - SIGMETRICS 2000, pp. 34–43 (2000)
Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: multiple-replica provable data possession. In: Proceedings of 28th Conference on Distributed Computing Systems, pp. 411–420 (2008)
Aguilera, M.K., Janakiraman, R., Xu, L.: Efficient fault-tolerant distributed storage using erasure codes, Technical report. Washington University in St. Louis (2004)
Bowers, K., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of 16th ACM Conference on Computer and Communications Security - CCS 2009, pp. 187–198 (2009)
Shi, E., Stefanov, E., Papamanthou, C.: Practical dynamic proofs of retrievability. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security - CCS 2013, pp. 325–336 (2013)
Cash, D., Küpçü, A., Wichs, D.: Dynamic proofs of retrievability via oblivious RAM. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 279–295. Springer, Heidelberg (2013)
Ahlswede, R., Cai, N., Li, S., Yeung, R.: Network information flow. IEEE Trans. Inf. Theor. 46(4), 1204–1216 (2000)
Li, S.Y.R., Yeung, R.W., Cai, N.: Linear network coding. IEEE Trans. Inf. Theor. 49(2), 371–381 (2003)
Dimakis, A., Godfrey, P., Wu, Y., Wainwright, M., Ramchandran, K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theor. 56(9), 4539–4551 (2010)
Acedanski, S., Deb, S., Medard, M., Koetter, R.: How good is random linear coding based distributed networked storage? In: Workshop on Network Coding, Theory and Applications - NETCOD 2005 (2005)
Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292–305. Springer, Heidelberg (2009)
Cheng, C., Jiang, T.: An efficient homomorphic MAC with small key size for authentication in network coding. IEEE Trans. Comput. 62(10), 2096–2100 (2012)
Cheng, C., Jiang, T., Zhang, Q.: TESLA-based homomorphic MAC for authentication in P2P system for live streaming with network coding. IEEE J. Sel. Areas Commun. 31(9), 291–298 (2013)
Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002)
Freeman, D.M.: Improved security for linearly homomorphic signatures: a generic framework. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 697–714. Springer, Heidelberg (2012)
Li, J., Yang, S., Wang, X., Xue, X., Li, B.: Tree-structured Data Regeneration in Distributed Storage Systems with Network Coding. In: Proceedings of 29th Conference on Information Communications - INFOCOM 2010, pp. 2892–2900 (2010)
Chen, B., Curtmola, R., Ateniese, G., Burns, R.: Remote data checking for network coding-based distributed storage systems. In: Proceedings of ACM Cloud Computing Security Workshop - CCSW 2010, pp. 31–42 (2010)
Chen, H.C.H., Hu, Y., Lee, P.P.C., Tang, Y.: NCCloud: a network-coding-based storage system in a cloud-of-clouds. IEEE Trans. Comput. 63(1), 31–44 (2014)
Le, A., Markopoulou, A.: NC-Audit: auditing for network coding storage. In: International Symposium on Network Coding - NetCod 2012, pp. 155–160 (2012)
Omote, K., Thao, T.P.: MD-POR: Multi-source and direct repair for network coding-based proof of retrievability. Int. J. Distrib. Sens. Network. (IJDSN) 2015, 14 (2015). Article ID: 586720
Yan, W., Yang, M., Li, L., Fang, H.: Short signature scheme for multi-source network coding. Comput. Commun. 35(3), 344–351 (2012)
Koetter, R., Medard, M.: An algebraic approach to network coding. IEEE/ACM Trans. Network. 11(5), 782–795 (2003)
Le, A., Markopoulou, A.: On detecting pollution attacks in inter-session network coding. In: Proceedings of 31st IEEE Conference on Computer Communications - INFOCOM 2012, pp. 343–351 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Omote, K., Thao, T.P. (2016). POR-2P: Network Coding-Based POR for Data Provision-Payment System. In: Lambrinoudakis, C., Gabillon, A. (eds) Risks and Security of Internet and Systems. CRiSIS 2015. Lecture Notes in Computer Science(), vol 9572. Springer, Cham. https://doi.org/10.1007/978-3-319-31811-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-31811-0_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31810-3
Online ISBN: 978-3-319-31811-0
eBook Packages: Computer ScienceComputer Science (R0)