2013
DOI: 10.1007/978-3-642-38348-9_17
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Proofs of Retrievability via Oblivious RAM

Abstract: Proofs of retrievability allow a client to store her data on a remote server (e.g., "in the cloud") and periodically execute an efficient audit protocol to check that all of the data is being maintained correctly and can be recovered from the server. For efficiency, the computation and communication of the server and client during an audit protocol should be significantly smaller than reading/transmitting the data in its entirety. Although the server is only asked to access a few locations of its storage durin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
101
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 121 publications
(103 citation statements)
references
References 26 publications
2
101
0
Order By: Relevance
“…Remote data integrity checks for public cloud storage have been investigated in various systems and security models [5]- [24]. Considering the large size of the outsourced data and data owner's constrained resource capability, the cost to audit data integrity in the cloud environment could be formidable and expensive to data owner.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Remote data integrity checks for public cloud storage have been investigated in various systems and security models [5]- [24]. Considering the large size of the outsourced data and data owner's constrained resource capability, the cost to audit data integrity in the cloud environment could be formidable and expensive to data owner.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, many studies [6], [9], [19]- [24] consider to support data dynamics on the basis of basic PDP and PoR models. Specially, Erway et al [19] developed a PDP scheme with full data dynamics using skip list.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…That is, the client can only perform data check and data retrieval, but cannot perform modification, insertion and deletion. A few PORs were proposed to deal with the dynamic operations, e.g, [21]- [24]; however, all these schemes are based on erasure coding, not network coding. There are two notable schemes which are mostly related to our proposed scheme.…”
Section: Introductionmentioning
confidence: 99%
“…Existing schemes [5]- [19] provide the data owner who holds secret keys can only modify the data. And all other users (who share data with the data owner only) have read permission.…”
Section: Introductionmentioning
confidence: 99%