{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:32:06Z","timestamp":1760243526212,"version":"build-2065373602"},"reference-count":19,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2013,7,5]],"date-time":"2013-07-05T00:00:00Z","timestamp":1372982400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Proofs of Retrievability (PoR) is one of the basic functions of electronic evidence preservation center in cloud. This paper proposes two PoR schemes to execute the workflow of evidence preservation center, which are named Finer Grained Proofs of Retrievability (FG-PoR) and More Lightweight Proofs of Retrievability (ML-PoR). The two PoR schemes do not use multi-replication technology or erasure code technology, but employ the verification tags and signatures to implement provable data possession and data recovery dual functions. When some data blocks have been lost in Archive Storage Area (ASA),  FG-PoR can recover each data block of evidence matrix, but ML-PoR can only recover a column of evidence matrix. The analysis results show our two PoR schemes do not only provide the integrity verification guarantee but also have robust recovery guarantee to electronic evidence in cloud. The two schemes can allow for lower computation and storage costs than other similar schemes; moreover, ML-PoR can provide lower costs than FG-PoR.<\/jats:p>","DOI":"10.3390\/info4030262","type":"journal-article","created":{"date-parts":[[2013,7,5]],"date-time":"2013-07-05T12:28:23Z","timestamp":1373027303000},"page":"262-282","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Proofs of Retrievability for Electronic Evidence  in Cloud"],"prefix":"10.3390","volume":"4","author":[{"given":"Xiuli","family":"Song","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"given":"Hongyao","family":"Deng","sequence":"additional","affiliation":[{"name":"School of Mathematics & Computer Science, Yangtze Normal University, Chongqing 408000, China"}]}],"member":"1968","published-online":{"date-parts":[[2013,7,5]]},"reference":[{"key":"ref_1","unstructured":"Chen, L., Mai, Y.H., Huang, C.H., Dong, Z.X., Shi, W.M., and Song, X.L. (2007). Computer Forensics Technology (in Chinese), Wuhan University Press."},{"key":"ref_2","unstructured":"Mell, P., and Grance, T. Available online:http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf."},{"key":"ref_3","unstructured":"Kent, K., Chevalier, S., Grance, T., and Dang, H. Available online:http:\/\/cybersd.com\/sec2\/800-86Summary.pdf."},{"key":"ref_4","unstructured":"Wang, C., Wang, Q., Ren, K., and Lou, W.J. (2009, January 13\u201315). Ensuring data storage security in cloud computing. Proceedings of the 2009 17th International Workshop on Quality of Service (IWQos\u201909), Charleston, SC, USA."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.clsr.2010.03.002","article-title":"Digital evidence in cloud computing systems","volume":"26","author":"Taylor","year":"2010","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_6","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., and Song, D. (November, January 29). Provable data possession at untrusted stores. Proceedings of the 14th Association for Computing Machinery (ACM) Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_7","unstructured":"Juels, A., and Kaliski, B.S. (November, January 29). PORs: Proofs of retrievability for large files. Proceedings of the 14th Association for Computing Machinery (ACM) Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., and Oprea, A. (2009, January 9\u201313). HAIL: A high-availability and integrity layer for cloud storage. Proceeding of the 16th Association for Computing Machinery (ACM) conference on Computer and Communications Security, New York, NY, USA.","DOI":"10.1145\/1653662.1653686"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Khan, O., Burns, R., and Ateniese, G. (2008, January 17\u201320). MR-PDP: Multiple-replica provable data possession. Proceedings of the 28th International Conference on Distributed Computing Systems, Beijing, China.","DOI":"10.1109\/ICDCS.2008.68"},{"key":"ref_10","unstructured":"Barsoum, A.F., and Hasan, M.A. Provable possession and replication of data over cloud servers. Available online:http:\/\/cacr.uwaterloo.ca\/techreports\/2010\/cacr2010-32.pdf."},{"key":"ref_11","unstructured":"Shacham, H., and Waters, B. (2008, January 7\u201311). Compact proofs of retrievability. Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, Melbourne, Australia."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","article-title":"Enabling public auditability and data dynamics for storage security in cloud computing","volume":"22","author":"Wang","year":"2011","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Wolthusen, S.D. (2009, January 15\u201317). Overcast: Forensic discovery in cloud environments. Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics, Stuttgart, Germany.","DOI":"10.1109\/IMF.2009.21"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"28","DOI":"10.4018\/jdcf.2012040103","article-title":"Calm before the storm: The challenges of cloud computing in digital forensics","volume":"4","author":"Grispos","year":"2012","journal-title":"Int. J. Digit. Crime Forensics"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Birk, D., and Wegener, C. (2011, January 26). Technical issues of forensic investigations in cloud computing environments. Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, USA.","DOI":"10.1109\/SADFE.2011.17"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Nyberg, K., and Rueppel, R.A. (1993, January 3\u20135). A new signature scheme based on the DSA giving message recovery. Proceedings of the 1st Association for Computing Machinery (ACM) Conference on Computer and Communications Security, Fairfax, VA, USA.","DOI":"10.1145\/168588.168595"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"De Santis, A. (1995). Advances in Cryptology\u2014EUROCRYPT\u201994: Workshop on the Theory and Application of Cryptographic Techniques Perugia, Italy, May 9\u201312, 1994. Proceedings, Springer.","DOI":"10.1007\/BFb0053418"},{"key":"ref_18","first-page":"67","article-title":"Reducing computational and communication complexity for dynamic provable data possession","volume":"8","author":"Liu","year":"2011","journal-title":"China Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"962","DOI":"10.3724\/SP.J.1001.2012.04175","article-title":"Key technologies of distributed storage for cloud computing","volume":"23","author":"Wang","year":"2012","journal-title":"J. Softw."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/4\/3\/262\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:47:45Z","timestamp":1760219265000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/4\/3\/262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,5]]},"references-count":19,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2013,9]]}},"alternative-id":["info4030262"],"URL":"https:\/\/doi.org\/10.3390\/info4030262","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2013,7,5]]}}}