CA2731954C - Apparatus, methods, and computer program products providing dynamic provable data possession - Google Patents
Apparatus, methods, and computer program products providing dynamic provable data possession Download PDFInfo
- Publication number
- CA2731954C CA2731954C CA2731954A CA2731954A CA2731954C CA 2731954 C CA2731954 C CA 2731954C CA 2731954 A CA2731954 A CA 2731954A CA 2731954 A CA2731954 A CA 2731954A CA 2731954 C CA2731954 C CA 2731954C
- Authority
- CA
- Canada
- Prior art keywords
- node
- skip list
- block
- proof
- blocks
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000004590 computer program Methods 0.000 title description 6
- 230000006870 function Effects 0.000 claims description 75
- 230000015654 memory Effects 0.000 claims description 31
- 238000012795 verification Methods 0.000 claims description 29
- 238000012986 modification Methods 0.000 claims description 15
- 230000004048 modification Effects 0.000 claims description 15
- 230000007423 decrease Effects 0.000 claims description 6
- 230000002441 reversible effect Effects 0.000 claims description 6
- 238000009825 accumulation Methods 0.000 claims description 2
- 238000010276 construction Methods 0.000 description 24
- 230000006854 communication Effects 0.000 description 20
- 238000004891 communication Methods 0.000 description 20
- 230000004044 response Effects 0.000 description 11
- 238000003780 insertion Methods 0.000 description 10
- 230000037431 insertion Effects 0.000 description 10
- 238000001514 detection method Methods 0.000 description 9
- 239000000284 extract Substances 0.000 description 9
- 230000003068 static effect Effects 0.000 description 9
- 238000012217 deletion Methods 0.000 description 7
- 230000037430 deletion Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 230000008859 change Effects 0.000 description 5
- 238000011156 evaluation Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 238000002474 experimental method Methods 0.000 description 4
- 239000000523 sample Substances 0.000 description 4
- 101710147185 Light-dependent protochlorophyllide reductase Proteins 0.000 description 3
- 101710193909 Protochlorophyllide reductase, chloroplastic Proteins 0.000 description 3
- 101710109491 Pyruvate synthase subunit PorA Proteins 0.000 description 3
- 101710109487 Pyruvate synthase subunit PorB Proteins 0.000 description 3
- 101710109489 Pyruvate synthase subunit PorC Proteins 0.000 description 3
- 101710109484 Pyruvate synthase subunit PorD Proteins 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000012946 outsourcing Methods 0.000 description 3
- 230000002085 persistent effect Effects 0.000 description 3
- 230000005477 standard model Effects 0.000 description 3
- 230000003044 adaptive effect Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000007175 bidirectional communication Effects 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 239000003643 water by type Substances 0.000 description 2
- 241001123862 Mico Species 0.000 description 1
- 241001362551 Samba Species 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000012634 fragment Substances 0.000 description 1
- 229910000078 germane Inorganic materials 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000007620 mathematical function Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 230000000135 prohibitive effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000003362 replicative effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/30—Compression, e.g. Merkle-Damgard construction
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13706608P | 2008-07-25 | 2008-07-25 | |
US61/137,066 | 2008-07-25 | ||
PCT/US2009/004322 WO2010011342A1 (en) | 2008-07-25 | 2009-07-24 | Apparatus, methods, and computer program products providing dynamic provable data possession |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2731954A1 CA2731954A1 (en) | 2010-01-28 |
CA2731954C true CA2731954C (en) | 2014-10-21 |
Family
ID=41570546
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2731954A Expired - Fee Related CA2731954C (en) | 2008-07-25 | 2009-07-24 | Apparatus, methods, and computer program products providing dynamic provable data possession |
Country Status (3)
Country | Link |
---|---|
US (1) | US8978155B2 (}{CA) |
CA (1) | CA2731954C (}{CA) |
WO (1) | WO2010011342A1 (}{CA) |
Families Citing this family (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001006374A2 (en) * | 1999-07-16 | 2001-01-25 | Intertrust Technologies Corp. | System and method for securing an untrusted storage |
US9497028B1 (en) * | 2007-05-03 | 2016-11-15 | Google Inc. | System and method for remote storage auditing |
WO2010020968A1 (en) * | 2008-08-22 | 2010-02-25 | Nxp B.V. | Verification of process integrity |
WO2010024931A1 (en) | 2008-08-29 | 2010-03-04 | Brown University | Cryptographic accumulators for authenticated hash tables |
CN103890709B (zh) * | 2011-11-07 | 2016-08-17 | 英派尔科技开发有限公司 | 基于缓存的键值数据库映射和复制 |
US20140245020A1 (en) * | 2013-02-22 | 2014-08-28 | Guardtime Ip Holdings Limited | Verification System and Method with Extra Security for Lower-Entropy Input Records |
US9678979B1 (en) * | 2013-07-31 | 2017-06-13 | EMC IP Holding Company LLC | Common backup format and log based virtual full construction |
US9268969B2 (en) * | 2013-08-14 | 2016-02-23 | Guardtime Ip Holdings Limited | System and method for field-verifiable record authentication |
US9418131B1 (en) * | 2013-09-24 | 2016-08-16 | Emc Corporation | Synchronization of volumes |
CN104794137B (zh) * | 2014-01-22 | 2019-01-22 | 腾讯科技(深圳)有限公司 | 排序记录的处理方法和排序查询方法及相关装置和系统 |
US9606870B1 (en) | 2014-03-31 | 2017-03-28 | EMC IP Holding Company LLC | Data reduction techniques in a flash-based key/value cluster storage |
CN105446964B (zh) * | 2014-05-30 | 2019-04-26 | 国际商业机器公司 | 用于文件的重复数据删除的方法及装置 |
US10025843B1 (en) | 2014-09-24 | 2018-07-17 | EMC IP Holding Company LLC | Adjusting consistency groups during asynchronous replication |
US9608810B1 (en) | 2015-02-05 | 2017-03-28 | Ionic Security Inc. | Systems and methods for encryption and provision of information security using platform services |
WO2016155804A1 (en) | 2015-03-31 | 2016-10-06 | Nec Europe Ltd. | Method for verifying information |
WO2016180495A1 (en) | 2015-05-13 | 2016-11-17 | Nec Europe Ltd. | A method for storing data in a cloud and a network for carrying out the method |
US10193696B2 (en) * | 2015-06-02 | 2019-01-29 | ALTR Solutions, Inc. | Using a tree structure to segment and distribute records across one or more decentralized, acylic graphs of cryptographic hash pointers |
US10200198B2 (en) | 2015-06-11 | 2019-02-05 | PeerNova, Inc. | Making cryptographic claims about stored data using an anchoring system |
US20170017567A1 (en) | 2015-07-15 | 2017-01-19 | Innovium, Inc. | System And Method For Implementing Distributed-Linked Lists For Network Devices |
US20170017414A1 (en) | 2015-07-15 | 2017-01-19 | Innovium, Inc. | System And Method For Implementing Hierarchical Distributed-Linked Lists For Network Devices |
US20170017419A1 (en) * | 2015-07-15 | 2017-01-19 | Innovium, Inc. | System And Method For Enabling High Read Rates To Data Element Lists |
US20170017420A1 (en) | 2015-07-15 | 2017-01-19 | Innovium, Inc. | System And Method For Enabling High Read Rates To Data Element Lists |
US10740474B1 (en) | 2015-12-28 | 2020-08-11 | Ionic Security Inc. | Systems and methods for generation of secure indexes for cryptographically-secure queries |
US10503730B1 (en) | 2015-12-28 | 2019-12-10 | Ionic Security Inc. | Systems and methods for cryptographically-secure queries using filters generated by multiple parties |
US10152527B1 (en) | 2015-12-28 | 2018-12-11 | EMC IP Holding Company LLC | Increment resynchronization in hash-based replication |
US20170230186A1 (en) * | 2016-02-05 | 2017-08-10 | Samsung Electronics Co., Ltd. | File management apparatus and method for verifying integrity |
US10324635B1 (en) | 2016-03-22 | 2019-06-18 | EMC IP Holding Company LLC | Adaptive compression for data replication in a storage system |
US10310951B1 (en) | 2016-03-22 | 2019-06-04 | EMC IP Holding Company LLC | Storage system asynchronous data replication cycle trigger with empty cycle detection |
US9959063B1 (en) | 2016-03-30 | 2018-05-01 | EMC IP Holding Company LLC | Parallel migration of multiple consistency groups in a storage system |
US10095428B1 (en) | 2016-03-30 | 2018-10-09 | EMC IP Holding Company LLC | Live migration of a tree of replicas in a storage system |
US9959073B1 (en) | 2016-03-30 | 2018-05-01 | EMC IP Holding Company LLC | Detection of host connectivity for data migration in a storage system |
US10565058B1 (en) | 2016-03-30 | 2020-02-18 | EMC IP Holding Company LLC | Adaptive hash-based data replication in a storage system |
US10440033B2 (en) | 2017-03-16 | 2019-10-08 | Sap Se | Data storage system file integrity check |
CA3230160A1 (en) * | 2017-08-11 | 2019-02-14 | ALTR Solutions, Inc. | Immutable datastore for low-latency reading and writing of large data sets |
US11316696B2 (en) * | 2017-09-29 | 2022-04-26 | R3 Ltd. | Hash subtrees for grouping components by component type |
US11546166B2 (en) * | 2018-07-02 | 2023-01-03 | Koninklijke Philips N.V. | Hash tree computation device |
CN109889505B (zh) * | 2019-01-23 | 2022-05-27 | 平安科技(深圳)有限公司 | 数据持有性验证方法及终端设备 |
CN112445521B (zh) * | 2019-09-02 | 2024-03-26 | 中科寒武纪科技股份有限公司 | 数据处理方法、相关设备及计算机可读介质 |
US11269595B2 (en) * | 2019-11-01 | 2022-03-08 | EMC IP Holding Company LLC | Encoding and evaluating multisets using prime numbers |
CN114265634A (zh) * | 2021-12-22 | 2022-04-01 | 中国农业银行股份有限公司 | 基于集中式版本控制系统的文件提交方法和装置 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7257711B2 (en) * | 2001-11-08 | 2007-08-14 | The Johns Hopkins University | Efficient authenticated dictionaries with skip lists and commutative hashing |
US7613796B2 (en) * | 2002-09-11 | 2009-11-03 | Microsoft Corporation | System and method for creating improved overlay network with an efficient distributed data structure |
US7308448B1 (en) * | 2003-03-21 | 2007-12-11 | Sun Microsystems, Inc | Method and apparatus for implementing a lock-free skip list that supports concurrent accesses |
CA2426619A1 (en) * | 2003-04-25 | 2004-10-25 | Ibm Canada Limited - Ibm Canada Limitee | Defensive heap memory management |
JP2006086568A (ja) * | 2004-09-14 | 2006-03-30 | Sony Corp | 情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム |
US9195665B2 (en) * | 2006-04-28 | 2015-11-24 | Hewlett-Packard Development Company, L.P. | Method and system for data retention |
ITBO20060648A1 (it) * | 2006-09-20 | 2008-03-21 | Univ Degli Studi Roma Tre | Metodo per la gestione dinamica e sicura di una tabella relazionale autenticata in un database |
US9384175B2 (en) * | 2008-02-19 | 2016-07-05 | Adobe Systems Incorporated | Determination of differences between electronic documents |
-
2009
- 2009-07-24 CA CA2731954A patent/CA2731954C/en not_active Expired - Fee Related
- 2009-07-24 WO PCT/US2009/004322 patent/WO2010011342A1/en active Application Filing
- 2009-07-24 US US12/737,583 patent/US8978155B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
US20130198854A1 (en) | 2013-08-01 |
US8978155B2 (en) | 2015-03-10 |
WO2010011342A1 (en) | 2010-01-28 |
CA2731954A1 (en) | 2010-01-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2731954C (en) | Apparatus, methods, and computer program products providing dynamic provable data possession | |
Erway et al. | Dynamic provable data possession | |
US9977918B2 (en) | Method and system for verifiable searchable symmetric encryption | |
Cash et al. | Dynamic proofs of retrievability via oblivious RAM | |
CN109791594B (zh) | 在关系数据库上执行写入和存储操作的方法及可读介质 | |
EP3693886B1 (en) | Optimizations for verification of interactions system and method | |
US9098725B2 (en) | Cryptographic accumulators for authenticated hash tables | |
Wang et al. | Enabling public auditability and data dynamics for storage security in cloud computing | |
US8458451B2 (en) | Database outsourcing with access privacy | |
Kamara et al. | Cs2: A searchable cryptographic cloud storage system | |
van den Hooff et al. | Versum: Verifiable computations over large public logs | |
Zhang et al. | Provable multiple replication data possession with full dynamics for secure cloud storage | |
Esiner et al. | Flexdpdp: Flexlist-based optimized dynamic provable data possession | |
Li et al. | Integrity-verifiable conjunctive keyword searchable encryption in cloud storage | |
Zhang et al. | Efficient dynamic provable possession of remote data via update trees | |
Goodrich et al. | Athos: Efficient authentication of outsourced file systems | |
Xu et al. | Leakage resilient proofs of ownership in cloud storage, revisited | |
Mo et al. | Enabling non-repudiable data possession verification in cloud storage systems | |
Heitzmann et al. | Efficient integrity checking of untrusted network storage | |
Zhang et al. | Do you know where your data’s been?–tamper-evident database provenance | |
Burns et al. | Verifiable audit trails for a versioning file system | |
Junxiang et al. | Dynamic provable data possession with batch-update verifiability | |
Sengupta et al. | Keyword-based delegable proofs of storage | |
Leibenger et al. | sec-cs: Getting the most out of untrusted cloud storage | |
Goyal et al. | A Key based Distributed Approach for Data Integrity and Consistency in JSON and XML (Hierarchical Data Exchange Formats) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20220725 |