Efficient Remote Data Possession Checking in Critical Information Infrastructures

Download Now
Provided by: Institute of Electrical & Electronic Engineers
Format: PDF
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, and so forth) is a matter of crucial importance. Remote data possession checking protocols permit checking that a remote server can access an uncorrupted file, in such a way that the verifier does not need to know beforehand the entire file that is being verified. Unfortunately, current protocols only allow a limited number of successive verifications or are impractical from the computational point of view.
Download Now

Find By Topic