Parity-based Data Outsourcing: Extension, Implementation, and Evaluation

dc.contributor.advisor Ying Cai
dc.contributor.author Hu, Zhenbi
dc.contributor.department Department of Computer Science
dc.date 2018-08-11T14:49:56.000
dc.date.accessioned 2020-06-30T03:03:04Z
dc.date.available 2020-06-30T03:03:04Z
dc.date.copyright Sun Jan 01 00:00:00 UTC 2017
dc.date.embargo 2001-01-01
dc.date.issued 2017-01-01
dc.description.abstract <p>Our research has developed a Parity-based Data Outsourcing (PDO) model. This model outsources a set of raw data by associating it with a set of parity data and then distributing both sets of data among a number of cloud servers that are managed independently by different service providers. Users query the servers for the data of their interest and are allowed to perform both authentication and correction. The former refers to the capability of verifying if the query result they receive is correct (i.e., all data items that satisfy the query condition are received, and every data item received is original from the data owner), whereas the latter, the capability of correcting the corrupted data, if any. Existing techniques all rely on complex cryptographic techniques and require the cloud server to build verification objects. In particular, they support only query authentication, but not error correction. In contrast, our approach enables users to perform both query authentication and error correction, and does so without having to install any additional software on a cloud server, which makes it possible to take advantage of the many cloud data management services available on the market today.</p> <p>This thesis makes the following contributions. 1) We extend the PDO model, which was originally designed for one-dimensional data, to handle multi-dimensional data. 2) We implement the PDO model, including parity coding, data encoding, data retrieval, query authentication and correction. 3) We evaluate the performance of the PDO model. We compare it with Merkle Hash Tree (MH-tree) and Signature Chain, two existing techniques that support query authentication, in terms of storage, communication, and computation overhead.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/etd/15325/
dc.identifier.articleid 6332
dc.identifier.contextkey 11051225
dc.identifier.doi https://doi.org/10.31274/etd-180810-4953
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath etd/15325
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/29508
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/etd/15325/Hu_iastate_0097M_16345.pdf|||Fri Jan 14 20:39:23 UTC 2022
dc.subject.disciplines Computer Sciences
dc.subject.keywords Authentication
dc.subject.keywords Correction
dc.subject.keywords Data Outsourcing
dc.subject.keywords Parity-based
dc.title Parity-based Data Outsourcing: Extension, Implementation, and Evaluation
dc.type thesis en_US
dc.type.genre thesis en_US
dspace.entity.type Publication
relation.isOrgUnitOfPublication f7be4eb9-d1d0-4081-859b-b15cee251456
thesis.degree.discipline Computer Science
thesis.degree.level thesis
thesis.degree.name Master of Science
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Hu_iastate_0097M_16345.pdf
Size:
1.09 MB
Format:
Adobe Portable Document Format
Description: