The Community for Technology Leaders
RSS Icon
Issue No.08 - August (2008 vol.20)
pp: 1034-1038
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of crucial importance. Remote data possession checking protocols permit to check that a remote server can access an uncorrupted file in such a way that the verifier does not need to know beforehand the entire file that is being verified. Unfortunately, current protocols only allow a limited number of successive verifications or are impractical from the computational point of view. In this paper, we present a new remote data possession checking protocol such that: i) it allows an unlimited number of file integrity verifications; ii) its maximum running time can be chosen at set-up time and traded off against storage at the verifier.
Infrastructure Protection, Security, integrity, and protection, Security and Protection
Francesc Sebé, Josep Domingo-Ferrer, Antoni Mart?nez-Ballest?, Yves Deswarte, Jean-Jacques Quisquater, "Efficient Remote Data Possession Checking in Critical Information Infrastructures", IEEE Transactions on Knowledge & Data Engineering, vol.20, no. 8, pp. 1034-1038, August 2008, doi:10.1109/TKDE.2007.190647
[1] Allmydata Inc., Unlimited Online Storage and Backup, http:/allmydata. com, 2007.
[2] G. Ateniese , R. Burns , R. Curtmola , J. Herring , L. Kissner , Z. Peterson , and D. Song , “Provable Data Possession at Untrusted Stores,” Cryptology ePrint Archive, Report 2007/202, http:/, May 2007.
[3] Y. Deswarte , J.-J. Quisquater , and A. Saidane , “Remote Integrity Checking,” Integrity and Internal Control in Information Systems VI, pp. 1-11. Kluwer Academic Publishers, Nov. 2003.
[4] C. Devine , “SHA-1 Source Code,”, 2004.
[5] FIPS-PUB-180-1, “Secure Hash Standard,” Technical Report FIPS PUB 180-1, Nat'l Inst. of Standards and Technology, , 1995.
[6] D.L. Gazzoni-Filho and P.S. Licciardi-Messeder-Barreto , “Demonstrating Data Possession and Uncheatable Data Transfer,” Cryptology ePrint Archive, Report 2006/150, http:/eprint.iacr. org/, 2006.
[7] A. Juels and B.S. Kaliski Jr. , “PORs: Proofs of Retrievability for Large Files,” Cryptology ePrint Archive, Report 2007/243, http:/, June 2007.
[8] G.H. Kim and E.H. Spafford , “The Design and Implementation of Tripwire: A File System Integrity Checker,” Proc. ACM Conf. Computer and Comm. Security, pp. 18-29, 1994.
[9] Network Technology Group, “DataVault Offsite Data Backup to Completely Secure Critical Computer Data,” http://www.ntg.comdatavault.asp, 2007.
[10] F. Sebé , A. Martínez-Ballesté , Y. Deswarte , J. Domingo-Ferrer , and J.-J. Quisquater , “Time-Bounded Remote File Integrity Checking,” Technical Report 04429, LAAS-CNRS, July 2004.
[11] V. Shoup , “NTL: A Library for Doing Number Theory,” http://www.shoup.netntl, 2004.
[12] Tripwire Inc., Tripwire Checking Software, http:/www.tripwire. com, 2007.
[13] A. Valdes , M. Almgren , S. Cheung , Y. Deswarte , B. Dutertre , J. Levy , H. Saïdi , V. Stavridou , and T.E. Uribe , “An Architecture for Adaptive Intrusion-Tolerant Server,” Proc. Security Protocols Workshop 2002, pp. 158-178, 2003.
[14] Webopedia, Data Vaulting, _vaulting.html , 2007.
[15] Wikipedia, Cyclic Redundancy Check, , 2007.
36 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool