The Community for Technology Leaders
Green Image
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of crucial importance. Remote data possession checking protocols permit to check that a remote server can access an uncorrupted file in such a way that the verifier does not need to know beforehand the entire file that is being verified. Unfortunately, current protocols only allow a limited number of successive verifications or are impractical from the computational point of view. In this paper, we present a new remote data possession checking protocol such that: i) it allows an unlimited number of file integrity verifications; ii) its maximum running time can be chosen at set-up time and traded off against storage at the verifier.
Infrastructure Protection, Security, integrity, and protection, Security and Protection
Francesc Sebé, Josep Domingo-Ferrer, Antoni Mart?nez-Ballest?, Yves Deswarte, Jean-Jacques Quisquater, "Efficient Remote Data Possession Checking in Critical Information Infrastructures", IEEE Transactions on Knowledge & Data Engineering, vol. 20, no. , pp. 1034-1038, August 2008, doi:10.1109/TKDE.2007.190647
82 ms
(Ver 3.3 (11022016))