DocumentCode :
3144533
Title :
PGV: A Storage Enforcing Remote Verification Scheme
Author :
Husain, Mohammad Iftekhar ; Uurtamo, S. ; Ko, Steven Y. ; Rudra, Atri ; Sridhar, Rajeswari
fYear :
2012
fDate :
8-11 Oct. 2012
Firstpage :
390
Lastpage :
395
Abstract :
This paper presents a storage enforcing remote verification scheme, PGV (Pretty Good Verification). While existing schemes are often developed to handle a malicious adversarial model, we argue that such a model is often too strong of an assumption, resulting in over-engineered, resource-intensive mechanisms. Instead, the storage enforcement property of PGV aims at removing a practical incentive for a storage server to cheat in order to save on storage space in a covert adversarial model. At its core, PGV relies on the well-known polynomial hash, we show that the polynomial hash provably possesses the storage enforcement property and is also efficient in terms of performance. In addition to the traditional application of a client verifying the storage content at a remote server, PGV can also be applied to de-duplication scenarios where the server wants to verify whether the client possesses a significant amount of information about a file (and not just a partial knowledge/fingerprint of the file) before granting access to an existing file. We theoretically prove the power of PGV by combining Kolmogorov complexity and list decoding, and experimentally show the simplicity and low overhead of PGV by comparing it with existing schemes. Altogether, PGV provides a good, practical way to perform storage enforcing remote verification.
Keywords :
client-server systems; cloud computing; computational complexity; cryptography; decoding; storage management; Kolmogorov complexity; PGV; covert adversarial model; deduplication scenario; file access; list decoding; malicious adversarial model; polynomial hash; pretty good verification scheme; remote server; resource-intensive mechanisms; storage content verification; storage enforcement property; storage enforcing remote verification scheme; storage server; storage space; Cloud computing; Complexity theory; Cryptography; Polynomials; Probabilistic logic; Protocols; Servers; cloud storage; proof of data possession; proof of ownership; proof of retrievability; storage enforcement;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on
Conference_Location :
Irvine, CA
ISSN :
1060-9857
Print_ISBN :
978-1-4673-2397-0
Type :
conf
DOI :
10.1109/SRDS.2012.50
Filename :
6424880
Link To Document :
بازگشت