{"title":"An Privacy Preserving and Multi-copy Supporting PDP Algorithm and its Application in Component Testing Tool","authors":"Yanhua Shi, Guozheng Zhang, Shuyu Li","doi":"10.1145/3341069.3342972","DOIUrl":null,"url":null,"abstract":"Aiming at the problem of malicious data deletion or tampering in the untrusted server-side storage, an improved PDP (Provable Data Possession) algorithm supporting privacy protection and multiple copies is proposed in the paper. BLS signature and encrypted copies with random mask are adopted in the algorithm. The implementation of the algorithm is described in detail. Experimental results show that the proposed algorithm achieves better performance compared with the MR-PDP algorithm proposed by Cutmola [6]. Finally, the algorithm is applied in a component testing tool to verify the integrity of component source files before component downloading and deployment.","PeriodicalId":411198,"journal":{"name":"Proceedings of the 2019 3rd High Performance Computing and Cluster Technologies Conference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2019 3rd High Performance Computing and Cluster Technologies Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3341069.3342972","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Aiming at the problem of malicious data deletion or tampering in the untrusted server-side storage, an improved PDP (Provable Data Possession) algorithm supporting privacy protection and multiple copies is proposed in the paper. BLS signature and encrypted copies with random mask are adopted in the algorithm. The implementation of the algorithm is described in detail. Experimental results show that the proposed algorithm achieves better performance compared with the MR-PDP algorithm proposed by Cutmola [6]. Finally, the algorithm is applied in a component testing tool to verify the integrity of component source files before component downloading and deployment.