SHoPS: Set Homomorphic Proof of Data Possession Scheme in Cloud Storage Applications

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The prospect of outsourcing an increasing amount of data to a third party and the abstract nature of the cloud promote the proliferation of security and privacy challenges, namely, the remote data possession checking. This paper addresses this security concern, while supporting the verification of several data blocks outsourced across multiple storing nodes. We propose a new set homomorphic proof of data possession, called SHoPS, supporting the verification of aggregated proofs. It proposes a deterministic Proof of Data Possession (PDP) scheme based on interactive proof protocols. Our approach has several advantages. First, it supports public verifiability where the data owner delegates the verification process to another entity, thus releasing him from the burden of periodical verifications. Second, it allows the aggregation of several proofs and the verification of a subset of data files' proofs while providing an attractive communication overhead.

Original languageEnglish
Title of host publicationProceedings - 2015 IEEE World Congress on Services, SERVICES 2015
EditorsRami Bahsoon, Liang-Jie Zhang
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages143-150
Number of pages8
ISBN (Electronic)9781467372756
DOIs
Publication statusPublished - 13 Aug 2015
Externally publishedYes
EventIEEE World Congress on Services, SERVICES 2015 - New York, United States
Duration: 27 Jun 20152 Jul 2015

Publication series

NameProceedings - 2015 IEEE World Congress on Services, SERVICES 2015

Conference

ConferenceIEEE World Congress on Services, SERVICES 2015
Country/TerritoryUnited States
CityNew York
Period27/06/152/07/15

Keywords

  • cloud storage
  • homomirphic encryption
  • proof of data possession
  • security

Fingerprint

Dive into the research topics of 'SHoPS: Set Homomorphic Proof of Data Possession Scheme in Cloud Storage Applications'. Together they form a unique fingerprint.

Cite this