Communications of the ACM
Enabling the Archival Storage of Signed Documents
FAST '02 Proceedings of the Conference on File and Storage Technologies
Strong Security for Network-Attached Storage
FAST '02 Proceedings of the Conference on File and Storage Technologies
Efficient Byzantine-Tolerant Erasure-Coded Storage
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Farsite: federated, available, and reliable storage for an incompletely trusted environment
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Awarded Best Student Paper! - Pond: The OceanStore Prototype
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Plutus: Scalable Secure File Sharing on Untrusted Storage
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
An approach for fault tolerant and secure data storage in collaborative work environments
Proceedings of the 2005 ACM workshop on Storage security and survivability
Autonomous distributed secret sharing storage system
Systems and Computers in Japan
Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
Long-Term Preservation of Digital Documents: Principles and Practices
Long-Term Preservation of Digital Documents: Principles and Practices
Preserving Digital Information
Preserving Digital Information
POTSHARDS: secure long-term storage without encryption
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
ArchiSafe: Legally Compliant Electronic Storage
IT Professional
Improving secure long-term archival of digitally signed documents
Proceedings of the 4th ACM international workshop on Storage security and survivability
Security-amplifying combiners for collision-resistant hash functions
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
An infrastructure for long-term archiving of authenticated and sensitive electronic documents
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Modeling long-term signature validation for resolution of dispute
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
Sustaining accessibility of information through digital preservation: A literature review
Journal of Information Science
Hi-index | 0.00 |
It is well known that the suitability of many cryptographic algorithms decreases with time. Hence, it is a challenging task to maintain the integrity, authenticity, confidentiality and availability of sensitive data over very long periods of time. A scalable approach to preserve the integrity and authenticity of archived data has been standardized in [12]. The confidentiality and availability of data can be supported using secret sharing techniques according to [26]. This paper introduces a reference architecture for trustworthy long-term archiving of sensitive data based on the combination of these approaches.