Skip to main content

DD-POR: Dynamic Operations and Direct Repair in Network Coding-Based Proof of Retrievability

  • Conference paper
  • First Online:
Computing and Combinatorics (COCOON 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9198))

Included in the following conference series:

Abstract

POR (Proof of Retrievability) is a protocol by which clients can distribute their data to cloud servers and can check if the data stored in the servers is available and intact. Based on the POR, the network coding is applied to improve network throughput. Although many network coding-based PORs have been proposed, most of them have not achieved the following practical features: direct repair and dynamic operations. In this paper, we propose the DD-POR (Dynamic operations and Direct repair in network coding-based POR) to address these shortcomings. When a server is corrupted, the DD-POR can support the direct repair in which the data stored in the corrupted server can be repaired using the data provided directly from the healthy servers. The client is thus free from the burden of data repair. Furthermore, the DD-POR allows the client to efficiently perform dynamic operations, i.e., modification, insertion and deletion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Juels, A., Kaliski, B.: PORs: Proofs of retrievability for large files. In: 14th ACM Computer and Communications Security Conf., CCS, pp. 584–597 (2007)

    Google Scholar 

  2. Shacham, H., Waters, B.: Compact Proofs of Retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  3. Bowers, K., Juels, A., Oprea, A.: Proofs of retrievability: theory and implementation. In: ACM Workshop on Cloud Computing Security, CCSW, pp. 43–54 (2009)

    Google Scholar 

  4. Bolosky, W.J., Douceur, J.R., Ely, D., Theimer, M.: Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs. SIGMETRICS 2000, 34–43 (2000)

    Article  Google Scholar 

  5. Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: Multiple-Replica Provable Data Possession. In: 28th Distributed Computing Systems Conf., ICDCS, pp. 411–420 (2008)

    Google Scholar 

  6. Zhang, Z., Lian, Q., Lin, S., Chen, W., Chen, Y., Jin, C.: Bitvault: A highly reliable distributed data retention platform. ACM SIGOPS Operating Systems Review 41(2), 27–36 (2007)

    Article  Google Scholar 

  7. Aguilera, M.K., Janakiraman, R., Xu, L.: Efficient fault-tolerant distributed storage using erasure codes. Tech. Rep., Washington University in St. Louis (2004)

    Google Scholar 

  8. Bowers, K., Juels, A., Oprea, A.: HAIL: A high-availability and integrity layer for cloud Storage. In: 16th ACM Computer and Communications Security Conf., CCS, pp. 187–198 (2009)

    Google Scholar 

  9. Dodis, Y., Vadhan, S., Wichs, D.: Proofs of Retrievability via Hardness Amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109–127. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Hendricks, J., Ganger, G.R., Reiter, M.: Verifying distributed erasure-coded data. In: 26th ACM Principles of Distributed Computing Symposium, pp. 163–168 (2007)

    Google Scholar 

  11. Ahlswede, R., Cai, N., Li, S., Yeung, R.: Network information flow. IEEE Trans. 46(4), 1204–1216 (2000)

    Google Scholar 

  12. Li, S., Yeung, R., Cai, N.: Linear Network Coding. IEEE Trans. 49(2), 371–381 (2003)

    Google Scholar 

  13. Koetter, R., Muriel, M.: An Algebraic Approach to Network Coding. IEEE/ACM Trans. on Networking (TON) 11(5), 782–795 (2003)

    Article  Google Scholar 

  14. Dimakis, A., Godfrey, P., Wu, Y., Wainwright, M., Ramchandran, K.: Network coding for distributed storage systems. IEEE Trans. Information Theory 56(9), 4539–4551 (2010)

    Article  Google Scholar 

  15. Li, J., Yang, S., Wang, X., Xue, X., Li, B.: Tree-structured Data Regeneration in Distributed Storage Systems with Network Coding. In: 29th IEEE Information Commun. Conf., pp. 2892–2900 (2000)

    Google Scholar 

  16. Chen, B., Curtmola, R., Ateniese, G., Burns, R.: Remote Data Checking for Network Coding-based Distributed Storage Systems. In: ACM Workshop on Cloud Computing Security, pp. 31–42 (2010)

    Google Scholar 

  17. Chen, H.C.H., Hu, Y., Lee, P.P.C., Tang, Y.: NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds. IEEE Trans. on Computers 63(1), 31–44 (2014)

    Article  MathSciNet  Google Scholar 

  18. Cash, D., Küpçü, A., Wichs, D.: Dynamic Proofs of Retrievability via Oblivious RAM. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 279–295. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  19. Elaine, S., Emil, S., Charalampos, P.: Practical dynamic proofs of retrievability. In: CCS, pp. 325–336 (2013)

    Google Scholar 

  20. Chen, B., Curtmola, R.: Robust dynamic remote data checking for public clouds. In: Proc of. ACM Conf. on Computer and Communications Security, CCS, pp. 1043–1045 (2012)

    Google Scholar 

  21. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling Public Auditability and Data Dynamics for Storage Security in cloud Computing. IEEE Trans. Parallel and Distributed System 22(5), 847–859 (2011)

    Article  Google Scholar 

  22. Omote, K., Thao, T.: MD-POR: Multi-source and Direct Repair for Network Coding-based Proof of Retrievability. Int. Journal of Distributed Sensor Networks (IJDSN) ArticleID:586720, January 2015

    Google Scholar 

  23. Le, A., Markopoulou, A.: NC-Audit: Auditing for network coding storage. In: NetCod 2012, pp. 155–160 (2012)

    Google Scholar 

  24. Le, A., Markopoulou, A.: On detecting pollution attacks in inter-session network coding. 31st IEEE Conf. on Computer Communications, INFOCOM, pp. 343–351 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tran Phuong Thao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Omote, K., Thao, T.P. (2015). DD-POR: Dynamic Operations and Direct Repair in Network Coding-Based Proof of Retrievability. In: Xu, D., Du, D., Du, D. (eds) Computing and Combinatorics. COCOON 2015. Lecture Notes in Computer Science(), vol 9198. Springer, Cham. https://doi.org/10.1007/978-3-319-21398-9_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21398-9_56

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21397-2

  • Online ISBN: 978-3-319-21398-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics