Preview

Critique: Provable Data Possession at Untrusted Stores

Powerful Essays
Open Document
Open Document
1129 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Critique: Provable Data Possession at Untrusted Stores
Paper Critique: “Provable Data Possession at Untrusted Stores”
Reviewer: Carol Williams

1. (10%) State the problem the paper is trying to solve.
The authors describe a way to probabilistically determine whether a file stored at a SSP exists and has not been modified, the results are: * Fast checks. They are I/O bound, not CPU bound * The size of the file stored at the server increases * The client needs to store a constant small amount of data per file * They use sampling to reduce the load on the server. * Uploads are slow because preprocessing is expensive on the order of 160kB/s 2. (20%) State the main contribution of the paper: solving a new problem, proposing a new algorithm, or presenting a new evaluation (analysis). If a new problem, why was the problem important? Is the problem still important today? Will the problem be important tomorrow? If a new algorithm or new evaluation (analysis), what are the improvements over previous algorithms or evaluations? How do they come up with the new algorithm or evaluation? * Formally define protocols for provable data possession (PDP) that provide probabilistic proof that a third party stores a file. * Introduce the first provably-secure and practical PDP schemes that guarantee data possession. * Implement one of our PDP schemes and show experimentally that probabilistic possession guarantees make it practical to verify possession of large data sets.

3. (15%) Summarize the (at most) 3 key main ideas (each in 1 sentence.)
The authors describe a way to probabilistically determine whether a file stored at a SSP exists and has not been modified. I don't quite understand the crypto, but the results are: * Fast checks. They are I/O bound, not CPU bound * The size of the file stored at the server increases * The client needs to store a constant small amount of data per file * They use sampling to reduce the load on the server. * Uploads are slow

You May Also Find These Documents Helpful

  • Good Essays

    In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Verify the integrity of the output of common cryptographic and hashing tools to determine whether an encrypted message is legitimate or whether it has been modified…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cited: Ballad, B. B. (2011). Access Control, Authentication, and Public Key Infrastructure. Burlington: Jones & Bartlett Learning.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unix File Protection

    • 716 Words
    • 3 Pages

    References: Bishop, M. (n.d.). File Protection in UNIX. ucdavis.edu. Retrieved May 10, 2013, from http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CC4QFjAA&url=http%3A%2F%2Fnob.cs.ucdavis.edu%2Fbishop%2Fpapers%2F1987-decpro%2Ffilepro.ps&ei=gqORUZzGGem70gHX0oGICw&usg=AFQjCNFkWp7ekP675HOm2Y0er8g4-HKerg&bvm=bv.46471029,d.dmQ…

    • 716 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    Sivathanu, G., Wright, C. P., & Zadok, E. (2005, November 14). Stony Brook University. Retrieved from Ensuring Data Integrity in Storage: Techniques and Applications: http://www.fsl.cs.sunysb.edu/docs/integrity-storagess05/integrity.html…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Data is stored in a distributed way, Data partitioned in this scheme is already implicitly secured and each packet is stored distributed in different servers, log structure is maintained to keep track of each data block. Reconstruction of the data packet makes use of the log files.…

    • 470 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Businesses need to ensure the secure storage of company files and the guaranteed privacy of employee information. With the increased use and demand for network computing, information security has become a high priority. With all the ways in which someone can gain access to private and confidential information, the previous safe measures need to be enhanced and improved (Yaoxue Zhang; Laurenc T. Yang; Yuezhi Zhou; Wenyuan Kuang. 2010). For example, employee and company files are…

    • 962 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    A Description of Computers

    • 1084 Words
    • 5 Pages

    Data Bit- each individual ‘1’ or ‘0’ is a bit-short for binary digit. Byte- 8 bits are a byte. Kilobyte-is 1000 bytes (1024) Megabyte-is 1,000,000 bytes Gigabyte-is 1,000,000,000 bytes…

    • 1084 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Quiz 9

    • 445 Words
    • 2 Pages

    ____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.…

    • 445 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Using integrity checker is very vital for secure environment. It alerts when any changes are made in the information by the hackers. Without an integrity checker it may go unnoticed and finally leading to disaster loosing the original contents of the files.…

    • 433 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    On the contrary, cyber forensics science’s main focus is driven on information discovered during the investigation. However the challenge lies in the search hunt of valid and admissible evidence in the media storage of a…

    • 1026 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Unit 2 Assignment 2

    • 1463 Words
    • 6 Pages

    - Security issues for particular types of data, given business needs, anticipated threats and vulnerabilities;…

    • 1463 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Simple group key authentication is the sufficient and only practical form of authentication in the case of large asymmetric groups where a static party controls access to the group and members do not know each other, e.g., in video-on-demand applications. However, in DPGs, where the roles of group members are symmetric and a common agreement on the group membership is essential, mutual group key authentication is more desirable and more natural than simple group key authentication. In groups, the verification of the authenticity does not always have to be direct as in the two-party case. It also can be indirect via some other group member(s). This requires additional trust assumptions in these intermediary group members. However, these trust assumptions are quite natural when trust insiders not to give away the common group key. Similarly, in extending explicit key authentication, a confirmation which is either direct and pairwise or indirect is…

    • 1146 Words
    • 5 Pages
    Better Essays