Encyclopedia of Wireless Networks

Living Edition
| Editors: Xuemin (Sherman) Shen, Xiaodong Lin, Kuan Zhang

Distributed Storage Security

  • Dengzhi Liu
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-32903-1_317-1

Synonyms

Definitions

A distributed system divides end users’ data into multiple segments. Each of partial nodes in the distributed system stores one or multiple data segments. However, the data segments stored in the distributed system may be tampered with by adversaries. Moreover, it is possible that the distributed system may discard some rarely accessed data segments to save the storage resource or alleviate some resource-constrained nodes’ storage burden. Hence, the data storage security in the distributed system needs to be ensured.

Historical Background

The original intention of developing distributed computing is to use the idle computers to deal with other incidental computing tasks. Different from centralized computing, distributed computing can be used to process and store massive data with high efficiency and local resource saving. The first prototype of distributed computing was put forward by the...

This is a preview of subscription content, log in to check access.

References

  1. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: ACM conference on computer and communications security, pp 598–609Google Scholar
  2. Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of the international conference on security and privacy in communication networks, pp 1–10Google Scholar
  3. Ateniese G, Burns R, Curtmola R, Herring J, Khan O, Kissner L, Peterson Z, Song D (2011) Remote data checking using provable data possession. ACM Trans Inf Syst Secur 14(1):1–34CrossRefGoogle Scholar
  4. Bowers KD, Juels A, Oprea A (2009) Proofs of retrievability: theory and implementation. In: ACM cloud computing security workshop, pp 43–54Google Scholar
  5. Dodis Y, Vadhan S, Wichs D (2009) Proofs of retrievability via hardness amplification. In: Theory of cryptography, Springer, Berlin, Heidelberg, San Francisco, CA, pp 109–127CrossRefGoogle Scholar
  6. Juels A, Kaliski BS (2007) Pors: proofs of retrievability for large files. In: ACM conference on computer and communications security, pp 584–597Google Scholar
  7. Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for storage security in cloud computing. In: Proceedings of international conference on computer communications, pp 1–9Google Scholar
  8. Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parall Distrib Syst 22(5):847–859CrossRefGoogle Scholar
  9. Wang C, Chow SSM, Wang Q, Ren K, Lou W (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Nanjing University of Information Science and TechnologyNanjingChina

Section editors and affiliations

  • Haojin Zhu
    • 1
  • Jian Shen
    • 2
  1. 1.Shanghai Jiaotong University, ChinaShanghaiChina
  2. 2.Nanjing University of Information Science & Technology, ChinaNanjingChina