{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:37Z","timestamp":1750309477156,"version":"3.41.0"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T00:00:00Z","timestamp":1733356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["2020.05270.BD"],"award-info":[{"award-number":["2020.05270.BD"]}]},{"name":"INESC-ID","award":["UIDB\/50021\/2020 (DOI:10.54499\/UIDB\/50021\/2020)"],"award-info":[{"award-number":["UIDB\/50021\/2020 (DOI:10.54499\/UIDB\/50021\/2020)"]}]},{"name":"DACOMICO","award":["PTDC\/CCI-COM-\/2156\/2021"],"award-info":[{"award-number":["PTDC\/CCI-COM-\/2156\/2021"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Form. Asp. Comput."],"published-print":{"date-parts":[[2024,12,31]]},"abstract":"<jats:p>\n            The use of remote storage has become prevalent both by organizations and individuals. By relying on third-party storage, such as cloud or peer-to-peer storage services, availability, fault tolerance, and low access latency can be attained in a cost-efficient manner. Unfortunately, storage providers may misbehave and violate Service-Level Agreements (SLAs). In this article, we propose a new\n            <jats:italic>Proof of Timely-Retrievability<\/jats:italic>\n            (PoTR) that aims at assessing whether a provider is able to retrieve data objects with a latency lower than some SLA-specific threshold \u03b4. We have implemented the PoTR and evaluated two distinct configurations of the proof, one tailored to estimate the average latency experience by clients and the other tailored to assess its variance. We leverage Trusted Execution Environments (e.g., Intel SGX) to ensure that the proof is produced by the node being audited and to reduce the communication between the auditor and the audited node. We have experimentally evaluated our prototypes considering a challenging edge computing setting, where storage services are provided by resource-constrained fog nodes, and the distance between the auditor and the audited node can be large. Despite the noise introduced by edge network delays, we show that the auditor is able to effectively detect SLA violations.\n          <\/jats:p>","DOI":"10.1145\/3685935","type":"journal-article","created":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T11:37:29Z","timestamp":1722598649000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["PoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage Systems"],"prefix":"10.1145","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3082-1179","authenticated-orcid":false,"given":"Claudio","family":"Correia","sequence":"first","affiliation":[{"name":"Computer Science, Universidade de Lisboa, Instituto Superior Tecnico, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5114-2774","authenticated-orcid":false,"given":"Rita","family":"Prates","sequence":"additional","affiliation":[{"name":"Universidade de Lisboa, Instituto Superior Tecnico, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1681-6181","authenticated-orcid":false,"given":"Lu\u00eds","family":"Fonseca","sequence":"additional","affiliation":[{"name":"Universidade de Lisboa, Instituto Superior Tecnico, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7873-5531","authenticated-orcid":false,"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[{"name":"Universidade de Lisboa, Instituto Superior Tecnico, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0313-6590","authenticated-orcid":false,"given":"Luis","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"Universidade de Lisboa, Instituto Superior Tecnico, Lisboa, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2024,12,5]]},"reference":[{"issue":"5","key":"e_1_3_2_2_2","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1109\/LCOMM.2015.2411591","article-title":"Accurate one-way delay estimation with reduced client trustworthiness","volume":"19","author":"Abdou AbdelRahman","year":"2015","unstructured":"AbdelRahman Abdou, Ashraf Matrawy, and Paul C. van Oorschot. 2015. Accurate one-way delay estimation with reduced client trustworthiness. IEEE Commun. Lett. 19, 5 (2015), 735\u2013738.","journal-title":"IEEE Commun. Lett."},{"key":"e_1_3_2_3_2","unstructured":"Akamai. 2017. Online Retail Performance Report: Milliseconds Are Critical. Retrieved from https:\/\/www.akamai.com\/newsroom\/press-release\/akamai-releases-spring-2017-state-of-online-retail-performance-report"},{"key":"e_1_3_2_4_2","unstructured":"Akamai. 2021. Real Time Key Value Store for Edge Computing. Retrieved from https:\/\/www.akamai.com\/products\/edgekv"},{"key":"e_1_3_2_5_2","unstructured":"Akamai. 2021. Supercharge your EdgeWorkers Apps with a Serverless Key-value Store. Retrieved from https:\/\/www.akamai.com\/products\/edgekv"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3578359.3593038"},{"key":"e_1_3_2_7_2","volume-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy."},{"key":"e_1_3_2_8_2","volume-title":"Proceedings of the 40th IEEE Real-Time Systems Symposium (RTSS\u201919)","author":"Anwar Fatima","year":"2019","unstructured":"Fatima Anwar, Luis Garcia, Xi Han, and Mani Srivastava. 2019. Securing time in untrusted operating systems with TimeSeal. In Proceedings of the 40th IEEE Real-Time Systems Symposium (RTSS\u201919)."},{"key":"e_1_3_2_9_2","volume-title":"Proceedings of the 25th USENIX Security Symposium","author":"Armknecht Frederik","year":"2016","unstructured":"Frederik Armknecht, Ludovic Barman, Jens Bohli, and Ghassan Karame. 2016. Mirror: Enabling proofs of data replication and retrievability in the cloud. In Proceedings of the 25th USENIX Security Symposium."},{"key":"e_1_3_2_10_2","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security","author":"Ateniese Giuseppe","year":"2007","unstructured":"Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. 2007. Provable data possession at untrusted stores. In Proceedings of the ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_11_2","unstructured":"Autopoietic Cognitive Edge-cloud Services (ACES). 2022. Cloud-edge Service for Data Management. Retrieved from https:\/\/www.aces-edge.eu\/"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-131Ar2"},{"key":"e_1_3_2_13_2","article-title":"IPFS: Content addressed, versioned, P2P file system","author":"Benet J.","year":"2014","unstructured":"J. Benet. 2014. IPFS: Content addressed, versioned, P2P file system. arXiv preprint arXiv:1407.3561 (2014).","journal-title":"arXiv preprint arXiv:1407.3561"},{"key":"e_1_3_2_14_2","article-title":"Proof of replication","volume":"27","author":"Benet J.","year":"2017","unstructured":"J. Benet, D. Dalrymple, and N. Greco. 2017. Proof of replication. Protocol Labs, July 27 (2017). https:\/\/research.protocol.ai\/publications\/proof-of-replication\/","journal-title":"Protocol Labs, July"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046677"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.11.010"},{"key":"e_1_3_2_17_2","unstructured":"Cloudflare. 2009. CDN Global Network. Retrieved from https:\/\/www.cloudflare.com\/cdn\/"},{"key":"e_1_3_2_18_2","volume-title":"Proceedings of the 50th IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201920)","author":"Correia Cl\u00e1udio","year":"2020","unstructured":"Cl\u00e1udio Correia, Miguel Correia, and Lu\u00eds Rodrigues. 2020. Omega: A secure event ordering service for the edge. In Proceedings of the 50th IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201920)."},{"key":"e_1_3_2_19_2","volume-title":"Proceedings of the ACM on Asia Conference on Computer and Communications Security","author":"Dang Hung","year":"2017","unstructured":"Hung Dang, Erick Purwanto, and Chien Chang. 2017. Proofs of data residency: Checking whether your cloud files have been relocated. In Proceedings of the ACM on Asia Conference on Computer and Communications Security."},{"issue":"4","key":"e_1_3_2_20_2","doi-asserted-by":"crossref","DOI":"10.1109\/MSP.2014.38","article-title":"The untapped potential of trusted execution environments on mobile devices","volume":"12","author":"Ekberg J.","year":"2014","unstructured":"J. Ekberg, K. Kostiainen, and N. Asokan. 2014. The untapped potential of trusted execution environments on mobile devices. IEEE Secur. Priv. 12, 4 (2014), 29\u201337.","journal-title":"IEEE Secur. Priv."},{"key":"e_1_3_2_21_2","first-page":"1","volume-title":"Proceedings of the IEEE 20th International Symposium on Network Computing and Applications (NCA\u201921)","author":"Epif\u00e2neo Leonardo","year":"2021","unstructured":"Leonardo Epif\u00e2neo, Cl\u00e1udio Correia, and Lu\u00eds Rodrigues. 2021. Cathode: A consistency-aware data placement algorithm for the edge. In Proceedings of the IEEE 20th International Symposium on Network Computing and Applications (NCA\u201921). 1\u201310."},{"key":"e_1_3_2_22_2","unstructured":"Filecoin. 2017. A Blockchain Based Storage Network. Retrieved from https:\/\/spec.filecoin.io\/"},{"key":"e_1_3_2_23_2","volume-title":"Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY\u201913)","author":"Gondree M.","year":"2013","unstructured":"M. Gondree and Z. Peterson. 2013. Geolocation of data in the cloud. In Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY\u201913)."},{"key":"e_1_3_2_24_2","unstructured":"Grand View Research. 2023. CDN Market Report. Retrieved from https:\/\/www.grandviewresearch.com\/industry-analysis\/content-delivery-networks-cnd-market"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987583"},{"issue":"12","key":"e_1_3_2_26_2","article-title":"ReliableBox: Secure and verifiable cloud storage with location-aware backup","volume":"32","author":"Jiang Tao","year":"2021","unstructured":"Tao Jiang, Wenjuan Meng, Xu Yuan, Liangmin Wang, Jianhua Ge, and Jianfeng Ma. 2021. ReliableBox: Secure and verifiable cloud storage with location-aware backup. IEEE Trans. Parallel Distrib. Syst. 32, 12 (2021), 2996\u20133010.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"e_1_3_2_27_2","article-title":"Proofs of physical reliability for cloud storage systems","author":"Li L.","year":"2020","unstructured":"L. Li and L. Lazos. 2020. Proofs of physical reliability for cloud storage systems. IEEE Trans. Parallel Distrib. Syst. 31, 5 (2020), 1048\u20131065.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3104458"},{"key":"e_1_3_2_29_2","volume-title":"Proceedings of the 26th USENIX Security Symposium","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE: Rollback protection for trusted execution. In Proceedings of the 26th USENIX Security Symposium."},{"key":"e_1_3_2_30_2","article-title":"Security and privacy in fog computing: Challenges","volume":"5","author":"Mukherjee Mithun","year":"2017","unstructured":"Mithun Mukherjee, Rakesh Matam, Lei Shu, Leandros Maglaras, Mohamed Ferrag, Nikumani Choudhury, and Vikas Kumar. 2017. Security and privacy in fog computing: Challenges. IEEE Access 5 (2017), 19293\u201319304.","journal-title":"IEEE Access"},{"key":"e_1_3_2_31_2","volume-title":"Proceedings of the IEEE\/ACM Symposium on Edge Computing (SEC\u201918)","author":"Ning Zhenyu","year":"2018","unstructured":"Zhenyu Ning, Jinghui Liao, Fengwei Zhang, and Weisong Shi. 2018. Preliminary study of trusted execution environments on heterogeneous edge platforms. In Proceedings of the IEEE\/ACM Symposium on Edge Computing (SEC\u201918)."},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917630"},{"key":"e_1_3_2_33_2","volume-title":"Proceedings of the Global Internet of Things Summit","author":"Satyanarayanan Mahadev","year":"2017","unstructured":"Mahadev Satyanarayanan, Phillip Gibbons, Lily Mummert, Padmanabhan Pillai, Pieter Simoens, and Rahul Sukthankar. 2017. Cloudlet-based just-in-time indexing of IoT video. In Proceedings of the Global Internet of Things Summit."},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-021-02793-x"},{"key":"e_1_3_2_35_2","volume-title":"Proceedings of the 2nd ACM\/IEEE Symposium on Edge Computing (SEC\u201917)","author":"Streiffer Christopher","year":"2017","unstructured":"Christopher Streiffer, Animesh Srivastava, Victor Orlikowski, Yesenia Velasco, Vincentius Martin, Nisarg Raval, Ashwin Machanavajjhala, and Landon Cox. 2017. ePrivateEye: To the edge and beyond! In Proceedings of the 2nd ACM\/IEEE Symposium on Edge Computing (SEC\u201917)."},{"key":"e_1_3_2_36_2","unstructured":"Swarm. 2021. Distributed Storage Platform. Retrieved from https:\/\/github.com\/ethersphere\/"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705720"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3268935.3268942"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2012.2190551"},{"key":"e_1_3_2_40_2","article-title":"EnclavePoSt: A practical proof of storage-time in cloud via Intel SGX","author":"Zhang Yang","year":"2022","unstructured":"Yang Zhang, Weijing You, Shijie Jia, Limin Liu, Ziyi Li, and Wenfei Qian. 2022. EnclavePoSt: A practical proof of storage-time in cloud via Intel SGX. Secur. Commun. Netw. 2022, 1 (2022), 1\u201316.","journal-title":"Secur. Commun. Netw."}],"container-title":["Formal Aspects of Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3685935","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3685935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:26Z","timestamp":1750295846000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3685935"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,5]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,12,31]]}},"alternative-id":["10.1145\/3685935"],"URL":"https:\/\/doi.org\/10.1145\/3685935","relation":{},"ISSN":["0934-5043","1433-299X"],"issn-type":[{"type":"print","value":"0934-5043"},{"type":"electronic","value":"1433-299X"}],"subject":[],"published":{"date-parts":[[2024,12,5]]},"assertion":[{"value":"2023-12-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}