Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience
With the successful proliferation of data outsourcing services, security and privacy issues have drawn significant attention. Data authentication in particular plays an essential role in the storage of outsourced digital content and keeping it safe from modifications by inside or outside adversaries...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-12-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/8/12/2532 |
id |
doaj-a319e4c157f64933901d2fc8ff1c38cb |
---|---|
record_format |
Article |
spelling |
doaj-a319e4c157f64933901d2fc8ff1c38cb2020-11-24T23:31:29ZengMDPI AGApplied Sciences2076-34172018-12-01812253210.3390/app8122532app8122532Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage ResilienceDongyoung Koo0Youngjoo Shin1Joobeom Yun2Junbeom Hur3Department of Electronics and Information Engineering, Hansung University, 116 Samseongyo-ro 16-gil, Seongbuk-gu, Seoul 02876, KoreaDepartment of Computer and Information Engineering, Kwangwoon University, 20 Kwangwoon-ro, Nowon-gu, Seoul 01897, KoreaDepartment of Computer and Information Security, Sejong University, 209 Neungdong-ro, Gwangjin-gu, Seoul 05006, KoreaDepartment of Computer Science and Engineering, Korea University, 145 Anam-ro, Seongbuk-gu, Seoul 02841, KoreaWith the successful proliferation of data outsourcing services, security and privacy issues have drawn significant attention. Data authentication in particular plays an essential role in the storage of outsourced digital content and keeping it safe from modifications by inside or outside adversaries. In this paper, we focus on online data authentication using a Merkle (hash) tree to guarantee data integrity. By conducting in-depth diagnostics of the side channels of the Merkle tree-based approach, we explore novel solutions to improve the security and reliability of the maintenance of outsourced data. Based on a thorough review of previous solutions, we present a new method of inserting auxiliary random sources into the integrity verification proof on the prover side. This prevents the exposure of partial information within the tree structure and consequently releases restrictions on the number of verification execution, while maintaining desirable security and reliability of authentication for the long run. Based on a rigorous proof, we show that the proposed scheme maintains consistent reliability without being affected by continuous information leakage caused by repetitions of the authentication process. In addition, experimental results comparing with the proposed scheme with other state-of-the-art studies demonstrate its efficiency and practicality.https://www.mdpi.com/2076-3417/8/12/2532data outsourcingintegrityonline authenticationMerkle (hash) treedata lossinformation leakagereliability |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Dongyoung Koo Youngjoo Shin Joobeom Yun Junbeom Hur |
spellingShingle |
Dongyoung Koo Youngjoo Shin Joobeom Yun Junbeom Hur Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience Applied Sciences data outsourcing integrity online authentication Merkle (hash) tree data loss information leakage reliability |
author_facet |
Dongyoung Koo Youngjoo Shin Joobeom Yun Junbeom Hur |
author_sort |
Dongyoung Koo |
title |
Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience |
title_short |
Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience |
title_full |
Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience |
title_fullStr |
Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience |
title_full_unstemmed |
Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience |
title_sort |
improving security and reliability in merkle tree-based online data authentication with leakage resilience |
publisher |
MDPI AG |
series |
Applied Sciences |
issn |
2076-3417 |
publishDate |
2018-12-01 |
description |
With the successful proliferation of data outsourcing services, security and privacy issues have drawn significant attention. Data authentication in particular plays an essential role in the storage of outsourced digital content and keeping it safe from modifications by inside or outside adversaries. In this paper, we focus on online data authentication using a Merkle (hash) tree to guarantee data integrity. By conducting in-depth diagnostics of the side channels of the Merkle tree-based approach, we explore novel solutions to improve the security and reliability of the maintenance of outsourced data. Based on a thorough review of previous solutions, we present a new method of inserting auxiliary random sources into the integrity verification proof on the prover side. This prevents the exposure of partial information within the tree structure and consequently releases restrictions on the number of verification execution, while maintaining desirable security and reliability of authentication for the long run. Based on a rigorous proof, we show that the proposed scheme maintains consistent reliability without being affected by continuous information leakage caused by repetitions of the authentication process. In addition, experimental results comparing with the proposed scheme with other state-of-the-art studies demonstrate its efficiency and practicality. |
topic |
data outsourcing integrity online authentication Merkle (hash) tree data loss information leakage reliability |
url |
https://www.mdpi.com/2076-3417/8/12/2532 |
work_keys_str_mv |
AT dongyoungkoo improvingsecurityandreliabilityinmerkletreebasedonlinedataauthenticationwithleakageresilience AT youngjooshin improvingsecurityandreliabilityinmerkletreebasedonlinedataauthenticationwithleakageresilience AT joobeomyun improvingsecurityandreliabilityinmerkletreebasedonlinedataauthenticationwithleakageresilience AT junbeomhur improvingsecurityandreliabilityinmerkletreebasedonlinedataauthenticationwithleakageresilience |
_version_ |
1725537751395205120 |