Proceedings of the 18th ACM Conference on Computer and Communications Security 2011
DOI: 10.1145/2046707.2046765
|View full text |Cite
|
Sign up to set email alerts
|

Proofs of ownership in remote storage systems

Abstract: Cloud storage systems are becoming increasingly popular. A promising technology that keeps their cost down is deduplication, which stores only a single copy of repeating data. Client-side deduplication attempts to identify deduplication opportunities already at the client and save the bandwidth of uploading copies of existing files to the server.In this work we identify attacks that exploit client-side deduplication, allowing an attacker to gain access to arbitrary-size files of other users based on a very sma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
321
0
3

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 407 publications
(334 citation statements)
references
References 13 publications
0
321
0
3
Order By: Relevance
“…Markov chain representations are used to find statistics on the number of iterations required, and computer algebra gives closed form results for the completion rates. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg [9] introduce the notion of proofs-of ownership (PoWs), which lets a client efficiently prove to a server that that the client holds a file, rather than just some short information about it. Merkle trees and specific encodings, and analyze their security.…”
Section: International Journal For Research In Applied Science and Engimentioning
confidence: 99%
“…Markov chain representations are used to find statistics on the number of iterations required, and computer algebra gives closed form results for the completion rates. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg [9] introduce the notion of proofs-of ownership (PoWs), which lets a client efficiently prove to a server that that the client holds a file, rather than just some short information about it. Merkle trees and specific encodings, and analyze their security.…”
Section: International Journal For Research In Applied Science and Engimentioning
confidence: 99%
“…To prevent the adversary from launching these attacks, a new concept of Proof of Ownership (PoW) has been proposed [19], which enables users to prove their ownership of data copies to the storage server. PoW is implemented as an interactive algorithm.…”
Section: Block-level Deduplicaton Schemementioning
confidence: 99%
“…As a result, the adversary can share these short values with other users and realize the content distribution attack. To prevent these attacks, Halevi et al [19] proposed the notion of "proofs of ownership" (PoW) for deduplication systems, such that a client can efficiently prove to the cloud storage server that he owns a file without uploading the file itself. The technique is to use more entropy and longer proof to prevent the sharing.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It is proposed for reduce bandwidth as well as minimum space required to upload the data. In this paper use the new cryptographic methodology for secure proof duplication ( [1], [2]). …”
Section: Introductionmentioning
confidence: 99%