Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Koo, Dongyoung | - |
dc.contributor.author | Shin, Youngjoo | - |
dc.contributor.author | Yun, Joobeom | - |
dc.contributor.author | Hur, Junbeom | - |
dc.date.accessioned | 2021-09-02T02:28:14Z | - |
dc.date.available | 2021-09-02T02:28:14Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2018-12 | - |
dc.identifier.issn | 2076-3417 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/71346 | - |
dc.description.abstract | With the successful proliferation of data outsourcing services, security and privacy issues have drawn significant attention. Data authentication in particular plays an essential role in the storage of outsourced digital content and keeping it safe from modifications by inside or outside adversaries. In this paper, we focus on online data authentication using a Merkle (hash) tree to guarantee data integrity. By conducting in-depth diagnostics of the side channels of the Merkle tree-based approach, we explore novel solutions to improve the security and reliability of the maintenance of outsourced data. Based on a thorough review of previous solutions, we present a new method of inserting auxiliary random sources into the integrity verification proof on the prover side. This prevents the exposure of partial information within the tree structure and consequently releases restrictions on the number of verification execution, while maintaining desirable security and reliability of authentication for the long run. Based on a rigorous proof, we show that the proposed scheme maintains consistent reliability without being affected by continuous information leakage caused by repetitions of the authentication process. In addition, experimental results comparing with the proposed scheme with other state-of-the-art studies demonstrate its efficiency and practicality. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | MDPI | - |
dc.subject | OWNERSHIP | - |
dc.title | Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hur, Junbeom | - |
dc.identifier.doi | 10.3390/app8122532 | - |
dc.identifier.scopusid | 2-s2.0-85058132746 | - |
dc.identifier.wosid | 000455145000200 | - |
dc.identifier.bibliographicCitation | APPLIED SCIENCES-BASEL, v.8, no.12 | - |
dc.relation.isPartOf | APPLIED SCIENCES-BASEL | - |
dc.citation.title | APPLIED SCIENCES-BASEL | - |
dc.citation.volume | 8 | - |
dc.citation.number | 12 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Chemistry | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Materials Science | - |
dc.relation.journalResearchArea | Physics | - |
dc.relation.journalWebOfScienceCategory | Chemistry, Multidisciplinary | - |
dc.relation.journalWebOfScienceCategory | Engineering, Multidisciplinary | - |
dc.relation.journalWebOfScienceCategory | Materials Science, Multidisciplinary | - |
dc.relation.journalWebOfScienceCategory | Physics, Applied | - |
dc.subject.keywordPlus | OWNERSHIP | - |
dc.subject.keywordAuthor | data outsourcing | - |
dc.subject.keywordAuthor | integrity | - |
dc.subject.keywordAuthor | online authentication | - |
dc.subject.keywordAuthor | Merkle (hash) tree | - |
dc.subject.keywordAuthor | data loss | - |
dc.subject.keywordAuthor | information leakage | - |
dc.subject.keywordAuthor | reliability | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.