Proof Of Data Possession Protocol With Hash-based Deterministic Challenges And Privately Verifiable Payments
DOI:
https://doi.org/10.20535/tacs.2664-29132025.3.343963Abstract
The research presents a novel protocol for remote verification of data outsourced to a third-party
storage. The protocol aims to verify the possession of data in potentially untrusted storage without
downloading. We identified challenges in existing proof-of-possession protocols (PDP) by conducting
a comprehensive literature review. We stated the optimal threshold for the minimal communication
cost needed in existing PDP protocols to ensure the validity of the target percentage of data blocks
while maintaining high confidence. Building on these findings, we propose our own PDP requires a
fixed amount of communication and offers practically deterministic validity guarantees based on the
security of cryptographic hash functions. We show a scenario for monetization in both cloud-native
and blockchain environments to incentivize storage providers. A rigorous security analysis
demonstrates resilience against forgery attacks aimed to falsify integrity checks or compromise
verifiability assumptions. Our protocol significantly reduces communication overhead compared to
existing solutions while eliminating the cheating probability to negligible levels.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).