This paper describes a cryptographic protocol for securing self-organized data storage through periodic verifications. The proposed verification protocol, which goes beyond simple integrity checks and proves data conservation, is deterministic, efficient, and scalable. The security of this scheme relies both on the ECDLP intractability assumption and on the difficulty of finding the order of some specific elliptic curve over ℤn. The protocol also makes it possible to personalize replicas and to delegate verification without revealing any secret information. © 2008 Springer Science+Business Media, LLC.
CITATION STYLE
Oualha, N., ̈Onen, M., & Roudier, Y. (2008). A security protocol for self-organizing data storage. In IFIP International Federation for Information Processing (Vol. 278, pp. 675–679). Springer New York. https://doi.org/10.1007/978-0-387-09699-5_44
Mendeley helps you to discover research relevant for your work.