2012
DOI: 10.1109/tifs.2012.2217331
|View full text |Cite
|
Sign up to set email alerts
|

Coding for Trusted Storage in Untrusted Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(44 citation statements)
references
References 29 publications
0
39
0
Order By: Relevance
“…(4) Pollution attack: In this attack, the server is able to offer a correct message as a proof in the challenge step, while the corrupted data are used to generate a new block during the repair process. Consequently, the auditor must check the integrity of the new block without having access to the original blocks [Zhang et al 2012;Oliveira et al 2012]. Chen et al [2010] proposed a holistic approach for remote data auditing in the network-coding-based storage systems (RDC-NC) by extending the single-server data auditing methods, such as PDP [Ateniese et al 2007] and POR [Juels and Kaliski 2007], to validate the integrity of the stored blocks on each server.…”
Section: Network-coding-based Remote Data Auditingmentioning
confidence: 99%
“…(4) Pollution attack: In this attack, the server is able to offer a correct message as a proof in the challenge step, while the corrupted data are used to generate a new block during the repair process. Consequently, the auditor must check the integrity of the new block without having access to the original blocks [Zhang et al 2012;Oliveira et al 2012]. Chen et al [2010] proposed a holistic approach for remote data auditing in the network-coding-based storage systems (RDC-NC) by extending the single-server data auditing methods, such as PDP [Ateniese et al 2007] and POR [Juels and Kaliski 2007], to validate the integrity of the stored blocks on each server.…”
Section: Network-coding-based Remote Data Auditingmentioning
confidence: 99%
“…Encrypt the files using the secret key and stored in the distributed storage system. The large files are split into different original system and it is encoding with the coded systems and stored in network [9].…”
Section: Related Workmentioning
confidence: 99%
“…The message authentication code (MAC) is a kind of hash function which has been used for checking the data integrity for a long time. In the cooperative Internet backup scheme proposed by Lillibridge et al [2], the Reed-Solomon erasure-correcting codes [3] are applied to generate redundancy blocks. After that, the MAC 233 is calculated for each encrypted data block.…”
Section: Related Workmentioning
confidence: 99%