order to verify the response of each redundancy node,
compared to the l PRFs and 2(l + 1) multiplications
it has to compute for the response of each data node.
We conclude that compared to existing erasure-code
based proof of data reliability schemes, namely (Bow-
ers et al., 2009; Chen et al., 2015; Vasilopoulos et al.,
2018), we achieve comparable computational gain
while enabling data repair at the cloud side. Neverthe-
less, we observe that storage and bandwidth costs re-
main important. In order to improve the performance
of our scheme and reduce these costs, we propose a
new version of PORTOS which namely implements
the storage efficient variant of the linearly homomor-
phic tags introduced in (Shacham, H. and Waters, B.,
2008). More specifically, instead of generating one
tag per symbol, the new algorithm U.Store computes
a linearly homomorphic tag for a data segment, com-
prising k symbols. Due to space constrains, we omit
the description of this new solution which will be in-
cluded in an extended technical report, that will be-
come available after the review process.
7 CONCLUSION
In this paper, we proposed PORTOS, a novel proof
of data reliability solution for erasure-code-based dis-
tributed cloud storage systems. PORTOS enables
users to verify the retrievability of their data, as well
as the integrity of its respective redundancy. More-
over, in PORTOS the cloud storage provider gener-
ates the required redundancy and performs data re-
pair operations without any interaction with the user,
thus conforming to the current cloud model. Thanks
to the combination of PDP with time-lock puzzles,
PORTOS provides a rational cloud storage provider
with a strong incentive to provision sufficient redun-
dancy, which is stored at rest, guaranteeing this way
a reliable storage service.
REFERENCES
Armknecht, F., Barman, L., Bohli, J.-M., and Karame, G. O.
(2016). Mirror: Enabling proofs of data replication
and retrievability in the cloud. In Proceedings of
the 25th USENIX Conference on Security Symposium,
SEC’16.
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner,
L., Peterson, Z., and Song, D. (2007). Provable data
possession at untrusted stores. In Proceedings of the
14th ACM Conference on Computer and Communica-
tions Security, CCS ’07.
Barsoum, A. F. and Hasan, M. A. (2012). Integrity veri-
fication of multiple data copies over untrusted cloud
servers. In Proceedings of the 12th IEEE/ACM Inter-
national Symposium on Cluster, Cloud and Grid Com-
puting, CCGRID ’12.
Barsoum, A. F. and Hasan, M. A. (2015). Provable mul-
ticopy dynamic data possession in cloud computing
systems. IEEE Transactions on Information Forensics
and Security, 10.
Blaum, M., Brady, J., Bruck, J., and Menon, J. (1994).
Evenodd: An optimal scheme for tolerating double
disk failures in raid architectures. In Proceedings of
the 21st Annual International Symposium on Com-
puter Architecture, ISCA ’94.
Bowers, K. D., Juels, A., and Oprea, A. (2009). Hail: A
high-availability and integrity layer for cloud storage.
In Proceedings of the 16th ACM Conference on Com-
puter and Communications Security, CCS ’09.
Bowers, K. D., van Dijk, M., Juels, A., Oprea, A., and
Rivest, R. L. (2011). How to tell if your cloud files
are vulnerable to drive crashes. In Proceedings of the
18th ACM Conference on Computer and Communica-
tions Security, CCS ’11.
Chen, B., Ammula, A. K., and Curtmola, R. (2015). To-
wards server-side repair for erasure coding-based dis-
tributed storage systems. In Proceedings of the 5th
ACM Conference on Data and Application Security
and Privacy, CODASPY ’15.
Chen, B. and Curtmola, R. (2013). Towards self-repairing
replication-based storage systems using untrusted
clouds. In Proceedings of the Third ACM Conference
on Data and Application Security and Privacy, CO-
DASPY ’13.
Chen, B. and Curtmola, R. (2017). Remote data integrity
checking with server-side repair. Journal of Computer
Security, 25.
Chen, B., Curtmola, R., Ateniese, G., and Burns, R. (2010).
Remote data checking for network coding-based dis-
tributed storage systems. In Proceedings of the 2010
ACM Workshop on Cloud Computing Security Work-
shop, CCSW ’10.
Curtmola, R., Khan, O., Burns, R., and Ateniese, G. (2008).
Mr-pdp: Multiple-replica provable data possession. In
Proceedings of the 28th International Conference on
Distributed Computing Systems, ICDCS ’08.
Erway, C., K
¨
upc¸
¨
u, A., Papamanthou, C., and Tamassia, R.
(2009). Dynamic provable data possession. In Pro-
ceedings of the 16th ACM Conference on Computer
and Communications Security, CCS ’09.
Etemad, M. and K
¨
upc¸
¨
u, A. (2013). Transparent, dis-
tributed, and replicated dynamic provable data posses-
sion. In Proceedings of the 11th International Confer-
ence on Applied Cryptography and Network Security,
ACNS’13.
Juels, A. and Kaliski, Jr., B. S. (2007). Pors: Proofs of
retrievability for large files. In Proceedings of the 14th
ACM Conference on Computer and Communications
Security, CCS ’07.
Le, A. and Markopoulou, A. (2012). Nc-audit: Auditing
for network coding storage. In Proceedings of Inter-
national Symposium on Network Coding, NetCod ’12.
PORTOS: Proof of Data Reliability for Real-World Distributed Outsourced Storage
185