Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience

Author:

Koo Dongyoung,Shin Youngjoo,Yun Joobeom,Hur JunbeomORCID

Abstract

With the successful proliferation of data outsourcing services, security and privacy issues have drawn significant attention. Data authentication in particular plays an essential role in the storage of outsourced digital content and keeping it safe from modifications by inside or outside adversaries. In this paper, we focus on online data authentication using a Merkle (hash) tree to guarantee data integrity. By conducting in-depth diagnostics of the side channels of the Merkle tree-based approach, we explore novel solutions to improve the security and reliability of the maintenance of outsourced data. Based on a thorough review of previous solutions, we present a new method of inserting auxiliary random sources into the integrity verification proof on the prover side. This prevents the exposure of partial information within the tree structure and consequently releases restrictions on the number of verification execution, while maintaining desirable security and reliability of authentication for the long run. Based on a rigorous proof, we show that the proposed scheme maintains consistent reliability without being affected by continuous information leakage caused by repetitions of the authentication process. In addition, experimental results comparing with the proposed scheme with other state-of-the-art studies demonstrate its efficiency and practicality.

Funder

National Research Foundation of Korea

Publisher

MDPI AG

Subject

Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science

Reference42 articles.

1. The Top Cyber Risks to Accounting Firms Come from Inside the Firm https://www.cpapracticeadvisor.com/news/12427308/the-top-cyber-risks-to-accounting-firms-come-from-inside-the-firm

2. Tencent Cloud Says Ímproper Operationsĺed to Data Loss for Client as It Seeks to Implement Improvements https://www.scmp.com/tech/article/2158785/tencent-cloud-says-improper-operations-led-data-loss-client-it-seeks-implement

3. Publicly Verifiable Remote Data Integrity

4. These 5 Types of Insider Threats Could Lead to Costly DAta Breaches https://securityintelligence.com/these-5-types-of-insider-threats-could-lead-to-costly-data-breaches/

5. Global Cloud Data Loss Prevention (DLP) Market 2023 Growth Factors, Regional Analysis by Types, Applications, & Manufacturers with Forecasts https://thetradereporter.com/global-cloud-data-loss-prevention-dlp-market-2023-growth-factors-egional-analysis-by-types-applications-manufacturers-with-forecasts/139976/

Cited by 26 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Study on data storage and verification methods based on improved Merkle mountain range in IoT scenarios;Journal of King Saud University - Computer and Information Sciences;2024-07

2. An Integrity Auditing Scheme for Outsourcing Database in Power System;Proceedings of the 2024 5th International Conference on Computing, Networks and Internet of Things;2024-05-24

3. Advancing Video Data Privacy Preservation in IoT Networks through Video Blockchain;Information;2024-03-21

4. Storage Security;Data Storage Architectures and Technologies;2024

5. A Post-Quantum Digital Signature Using Verkle Trees and Lattices;Symmetry;2023-12-06

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3