Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Remote data checking using provable data possession
Ateniese G., Burns R., Curtmola R., Herring J., Khan O., Kissner L., Peterson Z., Song D. ACM Transactions on Information and System Security14 (1):1-34,2011.Type:Article
Date Reviewed: Aug 25 2011

As we increasingly embrace the concept of cloud computing, the risks of losing data could not be greater. This paper describes those risks, and offers a solution by providing a model for provable data possession.

This approach is novel in the sense that it provides lightweight, homomorphic data checking, which allows us to verify the integrity of a file without having to access the entire file. The provable data possession model samples the server’s storage, accessing a random subset of blocks. It accomplishes this by offering a random challenge to the storage. If the corresponding answer is correct, then we assume that the files in the storage have full integrity.

In this study, the authors assume that the challenge file is not corrupt. It would be interesting to discuss the converse, and how it would affect remote data checking capabilities. Further, it would be helpful to the reader to see proof of the concept, or at least a real-time scenario on a Windows/Linux server, rather than a load of mathematical probabilistic models.

Overall, I would recommend this paper to anyone interested in mathematical probabilities and protecting the integrity of data.

Reviewer:  Rajat Ravinder Review #: CR139400 (1202-0188)
Bookmark and Share
 
Information Storage (H.3.2 )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Information Storage": Date
Principles of delay-sensitive multimedia data storage retrieval
Gemmell J., Christodoulakis S. (ed) ACM Transactions on Information Systems 10(1): 51-90, 1992. Type: Article
May 1 1993
Partial match retrieval in implicit data structures
Alt H., Mehlhorn K., Munro J. Information Processing Letters 19(2): 61-65, 1984. Type: Article
May 1 1985
Performance of two-disk partition data allocations
Chang C., Chen C. BIT 27(3): 306-314, 1987. Type: Article
Mar 1 1988
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy