A security protocol for self-organizing data storage

7Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper describes a cryptographic protocol for securing self-organized data storage through periodic verifications. The proposed verification protocol, which goes beyond simple integrity checks and proves data conservation, is deterministic, efficient, and scalable. The security of this scheme relies both on the ECDLP intractability assumption and on the difficulty of finding the order of some specific elliptic curve over ℤn. The protocol also makes it possible to personalize replicas and to delegate verification without revealing any secret information. © 2008 Springer Science+Business Media, LLC.

Cite

CITATION STYLE

APA

Oualha, N., ̈Onen, M., & Roudier, Y. (2008). A security protocol for self-organizing data storage. In IFIP International Federation for Information Processing (Vol. 278, pp. 675–679). Springer New York. https://doi.org/10.1007/978-0-387-09699-5_44

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free