2013
DOI: 10.1007/978-3-642-38980-1_1
|View full text |Cite
|
Sign up to set email alerts
|

Transparent, Distributed, and Replicated Dynamic Provable Data Possession

Abstract: With the growing trend toward using outsourced storage, the problem of efficiently checking and proving data integrity needs more consideration. Starting with PDP and POR schemes in 2007, many cryptography and security researchers have addressed the problem. After the first solutions for static data, dynamic versions were developed (e.g., DPDP). Researchers also considered distributed versions of such schemes. Alas, in all such distributed schemes, the client needs to be aware of the structure of the cloud, an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
44
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 51 publications
(44 citation statements)
references
References 36 publications
0
44
0
Order By: Relevance
“…Detailed comparison and extended descriptions of these two data structures are provided in [16,17]. Some distributed versions of the idea have been studied as well [14,18]. There are also studies showing that a client's file is kept intact in the sense that client can retrieve (recover) it fully whenever she wishes [25,30,15,11,7].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Detailed comparison and extended descriptions of these two data structures are provided in [16,17]. Some distributed versions of the idea have been studied as well [14,18]. There are also studies showing that a client's file is kept intact in the sense that client can retrieve (recover) it fully whenever she wishes [25,30,15,11,7].…”
Section: Related Workmentioning
confidence: 99%
“…Data outsourcing to the cloud has become popular with the availability of affordable and more satisfying services (e.g., Dropbox, box.net, Google Drive, Amazon S3, iCloud, Skydrive) as well as with several studies in academia [16,2,4,31,3,15,25,30,11,18]. The most important impediment in public adoption of cloud systems is the lack of some security guarantees in data storage services [24,19,33].…”
Section: Introductionmentioning
confidence: 99%
“…Some schemes [5], [9], [11] deal only with archival static data files and does not consider dynamic operations such as insert, delete and update. Whereas many schemes support only private auditing such as [3], [10], [12].…”
Section: Introductionmentioning
confidence: 99%
“…Several auditing schemes such as [2,3,4], [9,10,11,12] were proposed under different cryptographic assumptions. Most of these schemes [12,13] deal with integrity verifications and do not support data recovery in case of data corruption.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, it is proved by Wang and Zhang [12] that, the malicious CSPs or organizer in this scheme even be able to pass validation without storing users' data. After that, Etemad et al [13] proposed a distributed and replicated PDP scheme which could enable CSPs to hide the internal structure from the client. This scheme is only designed to audit data files one by one.…”
Section: Introductionmentioning
confidence: 99%