Preview

Critique: Provable Data Possession at Untrusted Stores

Powerful Essays
Open Document
Open Document
1129 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Critique: Provable Data Possession at Untrusted Stores
Paper Critique: “Provable Data Possession at Untrusted Stores”
Reviewer: Carol Williams

1. (10%) State the problem the paper is trying to solve.
The authors describe a way to probabilistically determine whether a file stored at a SSP exists and has not been modified, the results are: * Fast checks. They are I/O bound, not CPU bound * The size of the file stored at the server increases * The client needs to store a constant small amount of data per file * They use sampling to reduce the load on the server. * Uploads are slow because preprocessing is expensive on the order of 160kB/s 2. (20%) State the main contribution of the paper: solving a new problem, proposing a new algorithm, or presenting a new evaluation (analysis). If a new problem, why was the problem important? Is the problem still important today? Will the problem be important tomorrow? If a new algorithm or new evaluation (analysis), what are the improvements over previous algorithms or evaluations? How do they come up with the new algorithm or evaluation? * Formally define protocols for provable data possession (PDP) that provide probabilistic proof that a third party stores a file. * Introduce the first provably-secure and practical PDP schemes that guarantee data possession. * Implement one of our PDP schemes and show experimentally that probabilistic possession guarantees make it practical to verify possession of large data sets.

3. (15%) Summarize the (at most) 3 key main ideas (each in 1 sentence.)
The authors describe a way to probabilistically determine whether a file stored at a SSP exists and has not been modified. I don't quite understand the crypto, but the results are: * Fast checks. They are I/O bound, not CPU bound * The size of the file stored at the server increases * The client needs to store a constant small amount of data per file * They use sampling to reduce the load on the server. * Uploads are slow

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Verify the integrity of the output of common cryptographic and hashing tools to determine whether an encrypted message is legitimate or whether it has been modified…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Data is stored in a distributed way, Data partitioned in this scheme is already implicitly secured and each packet is stored distributed in different servers, log structure is maintained to keep track of each data block. Reconstruction of the data packet makes use of the log files.…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Exercise 2

    • 939 Words
    • 4 Pages

    reestablishes the context for the document, why your topic is important to your readers, and offering a look to the future.…

    • 939 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    Sivathanu, G., Wright, C. P., & Zadok, E. (2005, November 14). Stony Brook University. Retrieved from Ensuring Data Integrity in Storage: Techniques and Applications: http://www.fsl.cs.sunysb.edu/docs/integrity-storagess05/integrity.html…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Cited: Ballad, B. B. (2011). Access Control, Authentication, and Public Key Infrastructure. Burlington: Jones & Bartlett Learning.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unix File Protection

    • 716 Words
    • 3 Pages

    References: Bishop, M. (n.d.). File Protection in UNIX. ucdavis.edu. Retrieved May 10, 2013, from http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CC4QFjAA&url=http%3A%2F%2Fnob.cs.ucdavis.edu%2Fbishop%2Fpapers%2F1987-decpro%2Ffilepro.ps&ei=gqORUZzGGem70gHX0oGICw&usg=AFQjCNFkWp7ekP675HOm2Y0er8g4-HKerg&bvm=bv.46471029,d.dmQ…

    • 716 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    A Description of Computers

    • 1084 Words
    • 5 Pages

    Data Bit- each individual ‘1’ or ‘0’ is a bit-short for binary digit. Byte- 8 bits are a byte. Kilobyte-is 1000 bytes (1024) Megabyte-is 1,000,000 bytes Gigabyte-is 1,000,000,000 bytes…

    • 1084 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    On the contrary, cyber forensics science’s main focus is driven on information discovered during the investigation. However the challenge lies in the search hunt of valid and admissible evidence in the media storage of a…

    • 1026 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Quiz 9

    • 445 Words
    • 2 Pages

    ____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.…

    • 445 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 2 Assignment 2

    • 1463 Words
    • 6 Pages

    - Security issues for particular types of data, given business needs, anticipated threats and vulnerabilities;…

    • 1463 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Simple group key authentication is the sufficient and only practical form of authentication in the case of large asymmetric groups where a static party controls access to the group and members do not know each other, e.g., in video-on-demand applications. However, in DPGs, where the roles of group members are symmetric and a common agreement on the group membership is essential, mutual group key authentication is more desirable and more natural than simple group key authentication. In groups, the verification of the authenticity does not always have to be direct as in the two-party case. It also can be indirect via some other group member(s). This requires additional trust assumptions in these intermediary group members. However, these trust assumptions are quite natural when trust insiders not to give away the common group key. Similarly, in extending explicit key authentication, a confirmation which is either direct and pairwise or indirect is…

    • 1146 Words
    • 5 Pages
    Better Essays