64
When a client receives a query result from the service provider, it wants to be assured that the result
is both correct and complete, where correct means that the result must originate in the owners data and not has been tampered with, and complete means that the result includes all records satisfying the query.
Data Integrity in Untrustworthy Storage
While the transparent cloud provides flexible utility of network-based resources, the fear of loss of control on their data is one of the major concerns that prevent end users from migrating to cloud storage services.
Actually it is a potential risk that the storage infrastructure providers
become self-interested, untrustworthy, or even malicious.
There are different motivations whereby a storage service provider could become untrustworthy—for
instance, to cover the consequence of a mistake in operation, or deny the vulnerability in the system after the data have been stolen by an adversary. This section introduces two technologies to enable data owners to verify the data integrity while the files are stored in the remote untrustworthy storage services.
Note that the verifier could be either the data owner or a trusted third party, and the
prover could be the storage service provider or storage medium owner or system administrator.
●
Requirement #1. It should not be a pre-requirement that the verifier has to possess a complete copy of the data to be checked. And in practice, it does not make sense fora verifier to keep a duplicated copy of the content to be verified. As long as it serves the purpose well, storing a more concise contents digest of the data at the verifier should be enough. 65
●
Requirement #2. The protocol has to be very robust considering the untrustworthy prover. A malicious prover is motivated to hide the violation of data integrity. The protocol should be robust enough that such a prover ought to fail in convincing the verifier.
●
Requirement #3. The amount of information exchanged during the verification operation should not lead to high communication overhead.
●
Requirement #4. The protocol should be computationally efficient.
●
Requirement #5. It ought to be possible to run the verification an unlimited number of times.
Share with your friends: