Keyword-Based Delegable Proofs of Storage

12/12/2017
by   Binanda Sengupta, et al.
0

Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files. However, a large fraction of the data files the client outsources to the server is often archival in nature that the client uses for backup purposes and accesses less frequently. An untrusted server can thus delete some of these archival data files in order to save some space (and allocate the same to other clients) without being detected by the client (data owner). Proofs of storage enable the client to audit her data files uploaded to the server in order to ensure the integrity of those files. In this work, we introduce one type of (selective) proofs of storage that we call keyword-based delegable proofs of storage, where the client wants to audit all her data files containing a specific keyword (e.g., "important"). Moreover, it satisfies the notion of public verifiability where the client can delegate the auditing task to a third-party auditor who audits the set of files corresponding to the keyword on behalf of the client. We formally define the security of a keyword-based delegable proof-of-storage protocol. We construct such a protocol based on an existing proof-of-storage scheme and analyze the security of our protocol. We argue that the techniques we use can be applied atop any existing publicly verifiable proof-of-storage scheme for static data. Finally, we discuss the efficiency of our construction.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/16/2017

Cloud Data Auditing Using Proofs of Retrievability

Cloud servers offer data outsourcing facility to their clients. A client...
research
07/24/2020

Dynamic proofs of retrievability with low server storage

Proofs of Retrievability (PoRs) are protocols which allow a client to st...
research
05/05/2020

Secure Single-Server Nearly-Identical Image Deduplication

Cloud computing is often utilized for file storage. Clients of cloud sto...
research
03/11/2021

Optimizing Fund Allocation for Game-based Verifiable Computation Outsourcing

This paper considers the setting where a cloud server services a static ...
research
02/28/2022

Bonsai: A Generalized Look at Dual Deduplication

Cloud Service Providers (CSPs) offer a vast amount of storage space at c...
research
01/29/2023

Unified Singular Protocol Flow for OAuth (USPFO) Ecosystem

OAuth 2.0 is a popular authorization framework that allows third-party c...
research
07/22/2020

Yggdrasil: Privacy-aware Dual Deduplication in Multi Client Settings

This paper proposes Yggdrasil, a protocol for privacy-aware dual data de...

Please sign up or login with your details

Forgot password? Click here to reset