• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xiao Da, Shu Jiwu, Chen Kang, Zheng Weimin. A Practical Data Possession Checking Scheme for Networked Archival Storage[J]. Journal of Computer Research and Development, 2009, 46(10): 1660-1668.
Citation: Xiao Da, Shu Jiwu, Chen Kang, Zheng Weimin. A Practical Data Possession Checking Scheme for Networked Archival Storage[J]. Journal of Computer Research and Development, 2009, 46(10): 1660-1668.

A Practical Data Possession Checking Scheme for Networked Archival Storage

More Information
  • Published Date: October 14, 2009
  • Data possession checking (DPC) is used in networked archival storage to check in real time if the remote server holds a file intact before the actual access to the file occurs. The authors present a practical DPC scheme. In a challenge-response protocol, the checker ascertains the possession of a file by asking the server to compute a hash value of some randomly appointed data blocks of the file and return it together with a corresponding verification block. With this random sampling verification method, the computational and communication overheads of possession checking are reduced while a sufficiently high confidence level is obtained. A challenge renewal mechanism based on verification block circular queue is also proposed to allow the dynamic increase of the number of effective challenges which can be issued by the checker. Analysis shows that the storage overhead on the checker side and the communications overhead between the checker and the server are constant. Experimental results show that the computational overhead of a check with a confidence level of 99.4% is 1.8ms, which is negligible compared with the cost of disk I/O; The computational overhead of file preprocessing is reduced by three orders of magnitude by avoiding using public-key cryptosystem.
  • Related Articles

    [1]Li Yuan, Yang Sen, Sun Jing, Zhao Huiqun, Wang Guoren. Influential Cohesive Subgraph Discovery Algorithm in Dual Networks[J]. Journal of Computer Research and Development, 2023, 60(9): 2096-2114. DOI: 10.7544/issn1000-1239.202220337
    [2]Li Xin, Liu Guiquan, Li Lin, Wu Zongda, Ding Junmei. Circle-Based and Social Connection Embedded Recommendation in LBSN[J]. Journal of Computer Research and Development, 2017, 54(2): 394-404. DOI: 10.7544/issn1000-1239.2017.20150788
    [3]Yuan Xinpan, Long Jun, Zhang Zuping, Luo Yueyi, Zhang Hao, and Gui Weihua. Connected Bit Minwise Hashing[J]. Journal of Computer Research and Development, 2013, 50(4): 883-890.
    [4]Jiao Jian, Yao Shan, Li Xiaojian. Research on Network Bidirectional Topology Discovery Based on Measurer by Spreading[J]. Journal of Computer Research and Development, 2010, 47(5): 903-910.
    [5]Jin Xin, Xiong Yan, Li Min, and Yue Lihua. A Connectible-Cell Based Topology Control Algorithm for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(2): 217-226.
    [6]Liu Wei, Cui Li, Huang Changcheng. EasiFCCT:A Fractional Coverage Algorithm for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 196-204.
    [7]Yang Liu, Li Zhenyu, Zhang Dafang, Xie Gaogang. Topology Discovery with Smallest-Redundancy in IPv6[J]. Journal of Computer Research and Development, 2007, 44(6): 939-946.
    [8]Sun Yantao, Shi Zhiqiang, Wu Zhimei. Automatic Discovery of Physical Topology in Switched Ethernets[J]. Journal of Computer Research and Development, 2007, 44(2): 208-215.
    [9]Zhu Pengfei, Dai Yingxia, and Bao Xuhua. PKI-Based Mutual Connections Constrained with Discrepancy of Trust Domains[J]. Journal of Computer Research and Development, 2006, 43(10): 1804-1809.
    [10]Wen Yingyou, Zhao Jianli, Zhao Linliang, and Wang Guangxing. A Study of the Relationship Between Performance of Topology-Based MANET Routing Protocol and Network Coverage Density[J]. Journal of Computer Research and Development, 2005, 42(4): 684-689.
  • Cited by

    Periodical cited type(0)

    Other cited types(1)

Catalog

    Article views (831) PDF downloads (511) Cited by(1)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return