enabling efficient batch verification enabling efficient
play

Enabling Efficient Batch Verification Enabling Efficient Batch - PowerPoint PPT Presentation

Enabling Efficient Batch Verification Enabling Efficient Batch Verification on Data Integrity for Cloud on Data Integrity for Cloud ChinLaung Lei Department of Electrical Engineering National Taiwan University 1 Outline Introduction


  1. Enabling Efficient Batch Verification Enabling Efficient Batch Verification on Data Integrity for Cloud on Data Integrity for Cloud Chin‐Laung Lei Department of Electrical Engineering National Taiwan University 1

  2. Outline  Introduction  System model  Protocol  Experiments and performance analysis  Conclusion

  3. Cloud Computing Data Storage Data Storage Cloud Services Cloud Services Mobile Mobile Devices Devices Users Users

  4. Motivations

  5. Security for Cloud (Remote) Storage  Confidentiality  Various encryption systems  Integrity  Integrity verification protocols  Availability  Redundancy  Error correcting code

  6. Integrity Verification  Message digest  Naïve approach  No authenticated data integrity; Bandwidth wasting  Deterministic  Provable data possession (PDP)  Authenticated data integrity  Probabilistic  Proof of retrivability (PoR)  Authenticated data integrity & improved availability  Probabilistic

  7. Lifecycle  Repository (data) deployment  Generate tags  Integrity verification  Challenge data integrity  Generate proof of storage  (Optional) Repository evolution  Generate tags for modified part

  8. Scenario for Integrity Verification Third Party 2. Verifying Data Third Party Verifier Verifier Integrity 1. Deploying Data Data Data Owner Cloud Storage Owner Provider

  9. Issues  Replay attack  The status of repository is not clear  Performance  Slow verification  Even on personal computer  Batch verification  Single user  Multiple users

  10. Approaches  Replay attack  Revision number as timestamp  Performance  Multiplication instead of exponential operations  Batch verification  Repository as an single file

  11. Scenario for Single User Batch Integrity Verification Integrity Verification Repositories on the Cloud Repositories on the Cloud Third Party Verifier Third Party Verifier Deployment, Modification, ... Data Owner Data Owner

  12. Bilinear Map

  13. BLS Signatures

  14. Tokens

  15. Security Concern

  16. Security Concern

  17. Repository Deployment

  18. Repository Deployment

  19. Integrity Verification

  20. Integrity Verification

  21. Repository Evolution

  22. Batch Verification for Single User

  23. Probabilistic Detection Number of blocks needed to fulfill certain detection rate under various data corruption rate

  24. Probabilistic Detection  Check points # of Detection Data Challenged Rate Corruption Blocks Rate 300 95% 1% 460 99% 1% 4610 99% 0.1% 6910 99.9% 0.1%

  25. Benchmarks

  26. Verification Time Client-side verification time with 6910-block challenge

  27. Verification Time Client-side verification time with 512-megabyte file

  28. Scenario for Multiple Users Batch Integrity Verification Integrity Verification Repository with Repository with Three Privilege Three Privilege Domains Domains Third Party Verifier Third Party Verifier Deployment, Modification, ... Data Owner Data Owner

  29. From Single User to Multiple Users  Access control  Who can commit modifications of a certain part?  Batch verification  Verify integrity across different users’ data  Race condition  Concurrent write of the same project?

  30. Approaches  Access control  Multiple authority  Hierarchical  Batch verification  Repository as a single file  Race condition  Branching‐and‐merging

  31. Repository Deployment

  32. Key Delegation

  33. Tag Generation

  34. Integrity Verification

  35. Repository Evolution

  36. Batch Verification

  37. Branching-and-Merging  Before modify shared data  Copy to one’s own privilege domain (branching)  After finish the modification  Coordinate with other collaborators  Write the modifications to the trunk (merging)

  38. Branching-and-Merging (Example)

  39. Conclusion  Efficient integrity verification  Can even run on smart phone!  Batch verification  Convenient for verifiers  Suitable for online co‐working

  40. Thank You

  41. Appendix

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend