Proactive public key and signature systems
Proceedings of the 4th ACM conference on Computer and communications security
Secure distributed storage and retrieval
Theoretical Computer Science
Asynchronous verifiable secret sharing and proactive cryptosystems
Proceedings of the 9th ACM conference on Computer and communications security
LFSR-based Hashing and Authentication
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Bucket Hashing and its Application to Fast Message Authentication
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
MMH: Software Message Authentication in the Gbit/Second Rates
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Efficient Byzantine-Tolerant Erasure-Coded Storage
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
The Complexity of Online Memory Checking
FOCS '05 Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science
Asynchronous Veri.able Information Dispersal
SRDS '05 Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems
Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
A cooperative internet backup scheme
ATEC '03 Proceedings of the annual conference on USENIX Annual Technical Conference
Verifying distributed erasure-coded data
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Pors: proofs of retrievability for large files
Proceedings of the 14th ACM conference on Computer and communications security
Provable data possession at untrusted stores
Proceedings of the 14th ACM conference on Computer and communications security
Auditing to keep online storage services honest
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
MR-PDP: Multiple-Replica Provable Data Possession
ICDCS '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems
Proceedings of the 4th ACM international workshop on Storage security and survivability
A performance evaluation and examination of open-source erasure coding libraries for storage
FAST '09 Proccedings of the 7th conference on File and storage technologies
Dynamic provable data possession
Proceedings of the 16th ACM conference on Computer and communications security
Software performance of universal hash functions
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Optimal error correction against computationally bounded noise
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
RACS: a case for cloud storage diversity
Proceedings of the 1st ACM symposium on Cloud computing
The byzantine empire in the intercloud
ACM SIGACT News
Toward publicly auditable secure cloud data storage services
IEEE Network: The Magazine of Global Internetworking
Venus: verification for untrusted cloud storage
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Remote data checking for network coding-based distributed storage systems
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
A new data integrity verification mechanism for SaaS
WISM'10 Proceedings of the 2010 international conference on Web information systems and mining
Fair and dynamic proofs of retrievability
Proceedings of the first ACM conference on Data and application security and privacy
Remote data checking using provable data possession
ACM Transactions on Information and System Security (TISSEC)
DepSky: dependable and secure storage in a cloud-of-clouds
Proceedings of the sixth conference on Computer systems
Adaptive, secure, and scalable distributed data outsourcing: a vision paper
Proceedings of the 2011 workshop on Dynamic distributed data-intensive applications, programming abstractions, and systems
Adaptive data-driven service integrity attestation for multi-tenant cloud systems
Proceedings of the Nineteenth International Workshop on Quality of Service
Enabling security in cloud storage SLAs with CloudProof
USENIXATC'11 Proceedings of the 2011 USENIX conference on USENIX annual technical conference
Dark clouds on the horizon: using cloud storage as attack vector and online slack space
SEC'11 Proceedings of the 20th USENIX conference on Security
A comprehensive framework for secure query processing on relational data in the cloud
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
A security and high-availability layer for cloud storage
WISS'10 Proceedings of the 2010 international conference on Web information systems engineering
Proofs of ownership in remote storage systems
Proceedings of the 18th ACM conference on Computer and communications security
How to tell if your cloud files are vulnerable to drive crashes
Proceedings of the 18th ACM conference on Computer and communications security
Delegable provable data possession for remote data in the clouds
ICICS'11 Proceedings of the 13th international conference on Information and communications security
OAuth and ABE based authorization in semi-trusted cloud computing: aauth
Proceedings of the second international workshop on Data intensive computing in the clouds
Efficient software implementations of large finite fields GF(2n) for secure storage applications
ACM Transactions on Storage (TOS)
Efficient audit service outsourcing for data integrity in clouds
Journal of Systems and Software
Delusional boot: securing hypervisors without massive re-engineering
Proceedings of the 7th ACM european conference on Computer Systems
Secured cloud storage scheme using ECC based key management in user hierarchy
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Secure data management in the cloud
DNIS'11 Proceedings of the 7th international conference on Databases in Networked Information Systems
NCCloud: applying network coding for the storage repair in a cloud-of-clouds
FAST'12 Proceedings of the 10th USENIX conference on File and Storage Technologies
Lightweight integrity for XOR network coding in wireless sensor networks
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Integrity Verification of Multiple Data Copies over Untrusted Cloud Servers
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Efficient cooperative backup with decentralized trust management
ACM Transactions on Storage (TOS)
Cloud-based image processing system with priority-based data distribution mechanism
Computer Communications
Unity: secure and durable personal cloud storage
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Robust dynamic remote data checking for public clouds
Proceedings of the 2012 ACM conference on Computer and communications security
Scalia: an adaptive scheme for efficient multi-cloud storage
SC '12 Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis
An approach to high availability for cloud servers with snapshot mechanism
Proceedings of the Industrial Track of the 13th ACM/IFIP/USENIX International Middleware Conference
An integrity verification scheme for multiple replicas in clouds
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
New approaches to security and availability for cloud data
Communications of the ACM
µLibCloud: Providing High Available and Uniform Accessing to Multiple Cloud Storages
GRID '12 Proceedings of the 2012 ACM/IEEE 13th International Conference on Grid Computing
Proceedings of the third ACM conference on Data and application security and privacy
Multi-user dynamic proofs of data possession using trusted hardware
Proceedings of the third ACM conference on Data and application security and privacy
Towards self-repairing replication-based storage systems using untrusted clouds
Proceedings of the third ACM conference on Data and application security and privacy
International Journal of Cloud Applications and Computing
Towards a Generic Security Framework for Cloud Data Management Environments
International Journal of Distributed Systems and Technologies
Efficient dynamic provable possession of remote data via balanced update trees
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
RAFR: remote assessment of file redundancy
Proceedings of the 2013 international workshop on Security in cloud computing
An approach for constructing private storage services as a unified fault-tolerant system
Journal of Systems and Software
Using algebraic signatures to check data possession in cloud storage
Future Generation Computer Systems
SecureDropbox: a file encryption system suitable for cloud storage services
Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference
Verifying cloud services: present and future
ACM SIGOPS Operating Systems Review
PoWerStore: proofs of writing for efficient and robust storage
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Transparent, distributed, and replicated dynamic provable data possession
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
DupLESS: server-aided encryption for deduplicated storage
SEC'13 Proceedings of the 22nd USENIX conference on Security
DepSky: Dependable and Secure Storage in a Cloud-of-Clouds
ACM Transactions on Storage (TOS)
Data dynamics for remote data possession checking in cloud storage
Computers and Electrical Engineering
Sector-Disk (SD) Erasure Codes for Mixed Failure Modes in RAID Systems
ACM Transactions on Storage (TOS)
SD codes: erasure codes designed for how storage systems really fail
FAST'13 Proceedings of the 11th USENIX conference on File and Storage Technologies
Lockbox: mobility, privacy and values in cloud storage
Ethics and Information Technology
Bolt: data management for connected homes
NSDI'14 Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
Hi-index | 0.02 |
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and retrievable. HAIL strengthens, formally unifies, and streamlines distinct approaches from the cryptographic and distributed-systems communities. Proofs in HAIL are efficiently computable by servers and highly compact---typically tens or hundreds of bytes, irrespective of file size. HAIL cryptographically verifies and reactively reallocates file shares. It is robust against an active, mobile adversary, i.e., one that may progressively corrupt the full set of servers. We propose a strong, formal adversarial model for HAIL, and rigorous analysis and parameter choices. We show how HAIL improves on the security and efficiency of existing tools, like Proofs of Retrievability (PORs) deployed on individual servers. We also report on a prototype implementation.