4.5 Data Holding Authentication

In order to allow users to store data on an untrusted server and verify whether the server stores its original data without retrieving the data, data ownership proof is introduced. The Carbon Chain model provides the first ProV carbon-neutral Y-Secure solution for remote data inspection.
Definition 1. Prov Carbon neutral E Data Possession Scheme (PDP) is a set of four polynomial-time algorithms (KeyGen, TagBlock, GenProof, CheckProof). KeyGen(1K)→(PK, SK) was run by the client and the probabilistic key generation algorithm was used to establish the pattern. It takes a security parameter k as input and returns a matching pair of public keys and keys (pk, SK). TagBlock(PK, SK, M)→Tm This algorithm is run by the client and generates the verification metadata. It takes as input a public key PK, a key SK, and a filename m, and returns validation metadata Tm. GenProof(PK,F, Chal,∑)→V is run by the server to generate a proof of ownership.
It requires as input a public key PK, an ordered set of blocks F, a challenge CHal, and an ordered set of checksum metadata corresponding to blocks in F. For the block in F determined by the challenge CHal, it returns a possession proof V. CheckProof(PK, SK, Chal,V) →{' success ', 'fail0'} is run by the client to verify the proof of holding.
It requires as input a public key PK, a key SK, a challenge CHal and a proof of possession of V.
For blocks determined by CHal, it returns a proof of ownership that V is correct.