Distributed Storage Security
A distributed system divides end users’ data into multiple segments. Each of partial nodes in the distributed system stores one or multiple data segments. However, the data segments stored in the distributed system may be tampered with by adversaries. Moreover, it is possible that the distributed system may discard some rarely accessed data segments to save the storage resource or alleviate some resource-constrained nodes’ storage burden. Hence, the data storage security in the distributed system needs to be ensured.
The original intention of developing distributed computing is to use the idle computers to deal with other incidental computing tasks. Different from centralized computing, distributed computing can be used to process and store massive data with high efficiency and local resource saving. The first prototype of distributed computing was put forward by the...
- Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: ACM conference on computer and communications security, pp 598–609Google Scholar
- Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of the international conference on security and privacy in communication networks, pp 1–10Google Scholar
- Bowers KD, Juels A, Oprea A (2009) Proofs of retrievability: theory and implementation. In: ACM cloud computing security workshop, pp 43–54Google Scholar
- Juels A, Kaliski BS (2007) Pors: proofs of retrievability for large files. In: ACM conference on computer and communications security, pp 584–597Google Scholar
- Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for storage security in cloud computing. In: Proceedings of international conference on computer communications, pp 1–9Google Scholar