MR-PDP: Multiple-Replica Provable Data Possession
Top Cited Papers
- 1 June 2008
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 411-420
- https://doi.org/10.1109/icdcs.2008.68
Abstract
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of the data are actually stored. Storage servers can collude to make it look like they are storing many copies of the data, whereas in reality they only store a single copy. We address this shortcoming through multiple-replica provable data possession (MR-PDP): A provably-secure scheme that allows a client that stores t replicas of a file in a storage system to verify through a challenge-response protocol that (1) each unique replica can be produced at the time of the challenge and that (2) the storage system uses t times the storage required to store a single replica. MR-PDP extends previous work on data possession proofs for a single copy of a file in a client/server storage system (Ateniese et al., 2007). Using MR-PDP to store t replicas is computationally much more efficient than using a single-replica PDP scheme to store t separate, unrelated files (e.g., by encrypting each file separately prior to storing it). Another advantage of MR-PDP is that it can generate further replicas on demand, at little expense, when some of the existing replicas fail.Keywords
This publication has 10 references indexed in Scilit:
- Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered StoragePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- A fresh look at the reliability of long-term digital storagePublished by Association for Computing Machinery (ACM) ,2006
- Analysis of Long-Running Replicated SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- The LOCKSS peer-to-peer digital preservation systemACM Transactions on Computer Systems, 2005
- Erasure Coding Vs. Replication: A Quantitative ComparisonLecture Notes in Computer Science, 2002
- IvyPublished by Association for Computing Machinery (ACM) ,2002
- Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utilityPublished by Association for Computing Machinery (ACM) ,2001
- Wide-area cooperative storage with CFSPublished by Association for Computing Machinery (ACM) ,2001
- Feasibility of a serverless distributed file system deployed on an existing set of desktop PCsPublished by Association for Computing Machinery (ACM) ,2000
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993