In this paper, we propose several solutions to overcome all the aforementioned issues. For the two first attacks, we give two new constructions of the scheme, one using Index Hash Tables and the other based on the Merkle Hash Trees. We compare the efficiency of these two new systems with the previous one. For the third attack, we suggest a weaker security model for data privacy that applies to the new construction based on the Index Hash Tables, and we use the existing strong model to prove the data privacy security for the new construction using Merkle Hash Trees.
Category / Keywords: Provable Data Possession; Dynamcity; Public Verifiability; Security; Data Privacy; Index Hash Tables; Merkle Hash Trees. Date: received 29 Jun 2015, last revised 24 Feb 2016, withdrawn 3 Mar 2016 Contact author: cjpg967 at uowmail edu au Available format(s): (-- withdrawn --) Note: Some parts of the paper are put in an appendix. Version: 20160304:031234 (All versions of this report) Short URL: ia.cr/2015/645 Discussion forum: Show discussion | Start new discussion