Title
Efficient Remote Data Possession Checking in Critical Information Infrastructures
Abstract
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of crucial importance. Remote data possession checking protocols permit to check that a remote server can access an uncorrupted file in such a way that the verifier does not need to know beforehand the entire file that is being verified. Unfortunately, current protocols only allow a limited number of successive verifications or are impractical from the computational point of view. In this paper, we present a new remote data possession checking protocol such that: i) it allows an unlimited number of file integrity verifications; ii) its maximum running time can be chosen at set-up time and traded off against storage at the verifier.
Year
DOI
Venue
2008
10.1109/TKDE.2007.190647
IEEE Trans. Knowl. Data Eng.
Keywords
Field
DocType
uncorrupted file,entire file,checking protocol,critical information infrastructures,checking data possession,data vault,efficient remote data possession,new remote data possession,remote server,remote data possession checking,limited number,file integrity verification,database management,information infrastructure,security,information systems,cyclic redundancy check,data integrity,information system,power system protection,protocols,intrusion detection,critical infrastructure,database management systems,file servers
Information system,Data mining,File server,Computer security,Computer science,Cyclic redundancy check,Input/output,Data integrity,Need to know,Possession (law),Intrusion detection system
Journal
Volume
Issue
ISSN
20
8
1041-4347
Citations 
PageRank 
References 
95
3.32
5
Authors
5
Name
Order
Citations
PageRank
Francesc Sebé154640.92
Josep Domingo-Ferrer23231404.42
Antoni Martínez-Ballesté353035.63
Yves Deswarte41142156.24
Jean-Jacques Quisquater53894492.72