220 likes | 509 Views
NC-Audit: Auditing for Network Coding Storage. Anh Le and Athina Markopoulou University of California, Irvine. Outline. Background Related Work Key Techniques NC-Audit Evaluation Conclusion. NC-Based Distributed Storage. Key ideas: - Sub- packetization - Mixing when repair.
E N D
NC-Audit: Auditing for Network Coding Storage Anh Le and AthinaMarkopoulou University of California, Irvine
Outline • Background • Related Work • Key Techniques • NC-Audit • Evaluation • Conclusion NC-Audit: Auditing for NC Storage
NC-Based Distributed Storage • Key ideas:- Sub-packetization- Mixing when repair [Dimakis, 2011] NC-Audit: Auditing for NC Storage
The Auditing Problem Data Audit Audit Security Message NC-Audit: Auditing for NC Storage
Threat Model • Storage node hides data corruption • TPA acquires data from the auditing NC-Audit: Auditing for NC Storage
Desired Properties of NC-Audit • Data correctness guarantee • Privacy-preservingauditing • Support for repair and data dynamics • Low overhead NC-Audit: Auditing for NC Storage
Related Work • Integrity Checking for Remote Data • Proof of Retrievability[Juels ’07], [Shacham ’08] • Proof of Data Posession[Ateniese ’07] • Support for Data Dynamics[Ateniese ’08], [Erway ’09][Wang ’09] • Privacy Preserving Auditing[Shah ’06], [Wang ’10] • For NC Storage • Error Detection[Dikaliotis ’10] • Proof of Retrievability[Chen ’10] NC-Audit: Auditing for NC Storage
Outline • Background • Related Work • Key Techniques • NC-Audit • Evaluation • Conclusion NC-Audit: Auditing for NC Storage
The Naïve Scheme • Inefficient • Does not support repair • Violate privacy … ek ek eM e1 tM tk tk t1 k ei ti HMAC HMAC NC-Audit: Auditing for NC Storage
Key Techniques of NC-Audit c c t t NCrypt c Σαiei • SpaceMac- Homomorphic MAC • NCrypt- CPA-secure encryption … ek eM ek Σαiei Σαiei e1 tM tk tk t1 t t k1, .., kn k ei ti HMAC SpaceMac HMAC SpaceMac NC-Audit: Auditing for NC Storage
SpaceMac[Le, NetCod 10]Homomorphic Message Authentication Codes NC-Audit: Auditing for NC Storage
NCryptRandom Linear CPA-Secure Encryption NC-Audit: Auditing for NC Storage
Outline • Background • Related Work • Key Techniques • NC-Audit • Evaluation • Conclusion NC-Audit: Auditing for NC Storage
NC-Audit = SpaceMac + NCrypt • Homomorphic MAC: SpaceMac • Random Linear Encryption: NCrypt e t e c e t t t e c c t NC-Audit: Auditing for NC Storage
Repairing with Regular Scheme e1 e7 e3 e4 e’7 e2 e8 e5 e6 e'8 t6 t1 t3 t2 t4 t'8 t5 t'7 t8 t7 α1e1 + α2e2 High cost Node 1 e’7 t'7 α3e3+ α4e4 e'8 t'8 Node 2 α5e5 + α6e6 Node 3 Node 4 Node 4 NC-Audit: Auditing for NC Storage
Repairing with NC-Audit e2 e3 e1 e4 e5 e6 α1e1 + α2e2 e8 e’7 α5e5 + α6e6 α3e3+ α4e4 e'8 e7 t'8 t4 t2 t6 α1t1 + α2t2 t7 α3t3 + α4t4 t3 t'7 α5t5 + α6t6 t1 t5 t8 Node 1 Node 2 Node 3 Node 4 Node 4 NC-Audit: Auditing for NC Storage
Security Guarantees of NC-Audit • Data Posession • Privacy NC-Audit: Auditing for NC Storage
Outline • Background • Related Work • Key Techniques • NC-Audit • Evaluation • Conclusion NC-Audit: Auditing for NC Storage
Performance Evaluation • Comparisons: • [Wang et al., ESORICS ’09] • [Wang et al., INFOCOM ’10] • [Chen et al., CCSW ’10] • Implementation: • Java: - javax.crypto • 80-bit security: - q = 28, l = 10- 4 KB block NC-Audit: Auditing for NC Storage
Performance Evaluation NC-Audit: Auditing for NC Storage
Conclusion • NC-Audit: Auditing scheme for NC storage • Data correctness guarantee- SpaceMac • Privacy-preservingauditing- NCrypt • Support for repair and data dynamics • Low overhead NC-Audit: Auditing for NC Storage
http://www.ics.uci.edu/~anhml/software.html This work is supported by NSF and AFOSR