Next Article in Journal
Optimal Collision-Free Grip Planning for Biped Climbing Robots in Complex Truss Environment
Next Article in Special Issue
Machine-Learning-Based Side-Channel Evaluation of Elliptic-Curve Cryptographic FPGA Processor
Previous Article in Journal
Improving Applicability for Information Model of an IFC-Based Steel Bridge in the Design Phase Using Functional Meanings of Bridge Components
Previous Article in Special Issue
Side Channel Leakages Against Financial IC Card of the Republic of Korea
Open AccessArticle

Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience

1
Department of Electronics and Information Engineering, Hansung University, 116 Samseongyo-ro 16-gil, Seongbuk-gu, Seoul 02876, Korea
2
Department of Computer and Information Engineering, Kwangwoon University, 20 Kwangwoon-ro, Nowon-gu, Seoul 01897, Korea
3
Department of Computer and Information Security, Sejong University, 209 Neungdong-ro, Gwangjin-gu, Seoul 05006, Korea
4
Department of Computer Science and Engineering, Korea University, 145 Anam-ro, Seongbuk-gu, Seoul 02841, Korea
*
Authors to whom correspondence should be addressed.
Current address: Rm. #508, Research Bldg., 116 Samseongyo-ro 16-gil, Seongbuk-gu, Seoul 02876, Korea.
Appl. Sci. 2018, 8(12), 2532; https://doi.org/10.3390/app8122532
Received: 30 September 2018 / Revised: 24 November 2018 / Accepted: 3 December 2018 / Published: 7 December 2018
(This article belongs to the Special Issue Side Channel Attacks)
With the successful proliferation of data outsourcing services, security and privacy issues have drawn significant attention. Data authentication in particular plays an essential role in the storage of outsourced digital content and keeping it safe from modifications by inside or outside adversaries. In this paper, we focus on online data authentication using a Merkle (hash) tree to guarantee data integrity. By conducting in-depth diagnostics of the side channels of the Merkle tree-based approach, we explore novel solutions to improve the security and reliability of the maintenance of outsourced data. Based on a thorough review of previous solutions, we present a new method of inserting auxiliary random sources into the integrity verification proof on the prover side. This prevents the exposure of partial information within the tree structure and consequently releases restrictions on the number of verification execution, while maintaining desirable security and reliability of authentication for the long run. Based on a rigorous proof, we show that the proposed scheme maintains consistent reliability without being affected by continuous information leakage caused by repetitions of the authentication process. In addition, experimental results comparing with the proposed scheme with other state-of-the-art studies demonstrate its efficiency and practicality. View Full-Text
Keywords: data outsourcing; integrity; online authentication; Merkle (hash) tree; data loss; information leakage; reliability data outsourcing; integrity; online authentication; Merkle (hash) tree; data loss; information leakage; reliability
Show Figures

Figure 1

MDPI and ACS Style

Koo, D.; Shin, Y.; Yun, J.; Hur, J. Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience. Appl. Sci. 2018, 8, 2532.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop