Title
PGV: A Storage Enforcing Remote Verification Scheme
Abstract
This paper presents a storage enforcing remote verification scheme, PGV (Pretty Good Verification). While existing schemes are often developed to handle a malicious adversarial model, we argue that such a model is often too strong of an assumption, resulting in over-engineered, resource-intensive mechanisms. Instead, the storage enforcement property of PGV aims at removing a practical incentive for a storage server to cheat in order to save on storage space in a covert adversarial model. At its core, PGV relies on the well-known polynomial hash, we show that the polynomial hash provably possesses the storage enforcement property and is also efficient in terms of performance. In addition to the traditional application of a client verifying the storage content at a remote server, PGV can also be applied to de-duplication scenarios where the server wants to verify whether the client possesses a significant amount of information about a file (and not just a partial knowledge/fingerprint of the file) before granting access to an existing file. We theoretically prove the power of PGV by combining Kolmogorov complexity and list decoding, and experimentally show the simplicity and low overhead of PGV by comparing it with existing schemes. Altogether, PGV provides a good, practical way to perform storage enforcing remote verification.
Year
DOI
Venue
2012
10.1109/SRDS.2012.50
SRDS
Keywords
Field
DocType
client-server systems,cloud computing,computational complexity,cryptography,decoding,storage management,Kolmogorov complexity,PGV,covert adversarial model,deduplication scenario,file access,list decoding,malicious adversarial model,polynomial hash,pretty good verification scheme,remote server,resource-intensive mechanisms,storage content verification,storage enforcement property,storage enforcing remote verification scheme,storage server,storage space,cloud storage,proof of data possession,proof of ownership,proof of retrievability,storage enforcement
File server,Kolmogorov complexity,Cryptography,Computer science,Hash function,List decoding,Cloud storage,Computational complexity theory,Distributed computing,Cloud computing
Conference
ISSN
Citations 
PageRank 
1060-9857
0
0.34
References 
Authors
14
5
Name
Order
Citations
PageRank
Mohammad Iftekhar Husain1477.28
Steve Uurtamo2213.94
Steven Y. Ko347145.08
Atri Rudra460162.87
Ramalingam Sridhar526637.71