The Community for Technology Leaders
Green Image
ABSTRACT
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of crucial importance. Remote data possession checking protocols permit to check that a remote server can access an uncorrupted file in such a way that the verifier does not need to know beforehand the entire file that is being verified. Unfortunately, current protocols only allow a limited number of successive verifications or are impractical from the computational point of view. In this paper, we present a new remote data possession checking protocol such that: i) it allows an unlimited number of file integrity verifications; ii) its maximum running time can be chosen at set-up time and traded off against storage at the verifier.
INDEX TERMS
Infrastructure Protection, Security, integrity, and protection, Security and Protection
CITATION
Francesc Sebé, Jean-Jacques Quisquater, Josep Domingo-Ferrer, Antoni Mart?nez-Ballest?, Yves Deswarte, "Efficient Remote Data Possession Checking in Critical Information Infrastructures", IEEE Transactions on Knowledge & Data Engineering, vol. 20, no. , pp. 1034-1038, August 2008, doi:10.1109/TKDE.2007.190647
103 ms
(Ver 3.1 (10032016))