منابع مشابه
1 Dynamic Provable Data Possession
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the provable data possession (PDP) model, the client preprocesses the data and then sends it to an untrusted server for storage, while keeping a small amount of meta-data. The client later ask...
متن کاملProvable Dynamic Data Possession by Datalog Rules
In recent years, the concept of data outsourcing has become quite popular. With the appearance of Cloud Computing, there is a new paradigm: Cloud Storage. Cloud Storage means that the data owner moves its data to a Cloud Storage Server that is supposed to faithfully store the data and make it available to the data owner and perhaps the data requestors. This paper discusses how to guarantee the ...
متن کاملA Generic Dynamic Provable Data Possession Framework
Ateniese et al. introduced the Provable Data Possession (PDP) model in 2007. Following that, Erway et al. adapted the model for dynamically updatable data, and called it the Dynamic Provable Data Possession (DPDP) model. The idea is that a client outsources her files to a server, and later on challenges the server to obtain a proof that her data is kept intact. During recent years, many schemes...
متن کاملRobust Provable Data Possession Protocol
Provable data possession (PDP) is a technique for ensuring the validity of data in storage outsourcing. The main issue is how to frequently, efficiently verify that an untrusted server is correctly storing its client’s outsourced data. In this paper, we introduce a robust provable data possession protocol that allows a client that has stored he/her data at an untrusted server to verify the vali...
متن کاملTransparent, Distributed, and Replicated Dynamic Provable Data Possession
With the growing trend toward using outsourced storage, the problem of efficiently checking and proving data integrity needs more consideration. Starting with PDP and POR schemes in 2007, many cryptography and security researchers have addressed the problem. After the first solutions for static data, dynamic versions were developed (e.g., DPDP). Researchers also considered distributed versions ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Information and System Security
سال: 2015
ISSN: 1094-9224,1557-7406
DOI: 10.1145/2699909