The Community for Technology Leaders
Green Image
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of crucial importance. Remote data possession checking protocols permit to check that a remote server can access an uncorrupted file in such a way that the verifier does not need to know beforehand the entire file that is being verified. Unfortunately, current protocols only allow a limited number of successive verifications or are impractical from the computational point of view. In this paper, we present a new remote data possession checking protocol such that: i) it allows an unlimited number of file integrity verifications; ii) its maximum running time can be chosen at set-up time and traded off against storage at the verifier.
Infrastructure Protection, Security, integrity, and protection, Security and Protection

F. Sebé, J. Quisquater, J. Domingo-Ferrer, A. Mart?nez-Ballest? and Y. Deswarte, "Efficient Remote Data Possession Checking in Critical Information Infrastructures," in IEEE Transactions on Knowledge & Data Engineering, vol. 20, no. , pp. 1034-1038, 2007.
93 ms
(Ver 3.3 (11022016))