DocumentCode
3144533
Title
PGV: A Storage Enforcing Remote Verification Scheme
Author
Husain, Mohammad Iftekhar ; Uurtamo, S. ; Ko, Steven Y. ; Rudra, Atri ; Sridhar, Rajeswari
fYear
2012
fDate
8-11 Oct. 2012
Firstpage
390
Lastpage
395
Abstract
This paper presents a storage enforcing remote verification scheme, PGV (Pretty Good Verification). While existing schemes are often developed to handle a malicious adversarial model, we argue that such a model is often too strong of an assumption, resulting in over-engineered, resource-intensive mechanisms. Instead, the storage enforcement property of PGV aims at removing a practical incentive for a storage server to cheat in order to save on storage space in a covert adversarial model. At its core, PGV relies on the well-known polynomial hash, we show that the polynomial hash provably possesses the storage enforcement property and is also efficient in terms of performance. In addition to the traditional application of a client verifying the storage content at a remote server, PGV can also be applied to de-duplication scenarios where the server wants to verify whether the client possesses a significant amount of information about a file (and not just a partial knowledge/fingerprint of the file) before granting access to an existing file. We theoretically prove the power of PGV by combining Kolmogorov complexity and list decoding, and experimentally show the simplicity and low overhead of PGV by comparing it with existing schemes. Altogether, PGV provides a good, practical way to perform storage enforcing remote verification.
Keywords
client-server systems; cloud computing; computational complexity; cryptography; decoding; storage management; Kolmogorov complexity; PGV; covert adversarial model; deduplication scenario; file access; list decoding; malicious adversarial model; polynomial hash; pretty good verification scheme; remote server; resource-intensive mechanisms; storage content verification; storage enforcement property; storage enforcing remote verification scheme; storage server; storage space; Cloud computing; Complexity theory; Cryptography; Polynomials; Probabilistic logic; Protocols; Servers; cloud storage; proof of data possession; proof of ownership; proof of retrievability; storage enforcement;
fLanguage
English
Publisher
ieee
Conference_Titel
Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on
Conference_Location
Irvine, CA
ISSN
1060-9857
Print_ISBN
978-1-4673-2397-0
Type
conf
DOI
10.1109/SRDS.2012.50
Filename
6424880
Link To Document