A New Efficient and Secure POR Scheme Based on Network Coding
Title | A New Efficient and Secure POR Scheme Based on Network Coding |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Omote, K., Thao, T.P. |
Conference Name | Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on |
Date Published | May |
Keywords | Availability, cloud computing, corruption attack, corruption attack prevention, cost reduction, data availability, data checking, data communication, data confidentiality, data integrity, Data security, Decoding, dispersal code, efficient POR scheme, encoding, local data storage, maintenance, maintenance engineering, network coding, network coding-based POR, proof of retrievability, secure POR scheme, security of data, Servers, Silicon |
Abstract | Information is increasing quickly, database owners have tendency to outsource their data to an external service provider called Cloud Computing. Using Cloud, clients can remotely store their data without burden of local data storage and maintenance. However, such service provider is untrusted, therefore there are some challenges in data security: integrity, availability and confidentiality. Since integrity and availability are prerequisite conditions of the existence of a system, we mainly focus on them rather than confidentiality. To ensure integrity and availability, researchers have proposed network coding-based POR (Proof of Retrievability) schemes that enable the servers to demonstrate whether the data is retrievable or not. However, most of network coding-based POR schemes are inefficient in data checking and also cannot prevent a common attack in POR: small corruption attack. In this paper, we propose a new network coding-based POR scheme using dispersal code in order to reduce cost in checking phase and also to prevent small corruption attack. |
URL | http://ieeexplore.ieee.org/document/6838653/ |
DOI | 10.1109/AINA.2014.17 |
Citation Key | 6838653 |
- dispersal code
- Silicon
- Servers
- security of data
- secure POR scheme
- proof of retrievability
- network coding-based POR
- network coding
- maintenance engineering
- maintenance
- local data storage
- encoding
- efficient POR scheme
- Availability
- Decoding
- Data Security
- data integrity
- data confidentiality
- data communication
- data checking
- data availability
- cost reduction
- corruption attack prevention
- corruption attack
- Cloud Computing