Scale and performance in a distributed file system
ACM Transactions on Computer Systems (TOCS)
Communications of the ACM
Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
Implementing fault-tolerant services using the state machine approach: a tutorial
ACM Computing Surveys (CSUR)
Password authentication with insecure communication
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Venti: A New Approach to Archival Storage
FAST '02 Proceedings of the Conference on File and Storage Technologies
A Framework for Evaluating Storage System Security
FAST '02 Proceedings of the Conference on File and Storage Technologies
Scalable Secure Storage when Half the System Is Faulty
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
How to Make Replicated Data Secure
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
HOTOS '01 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
Farsite: federated, available, and reliable storage for an incompletely trusted environment
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Embedded inodes and explicit grouping: exploiting disk bandwidth for small files
ATEC '97 Proceedings of the annual conference on USENIX Annual Technical Conference
How to Make a Multiprocessor Computer That Correctly Executes Multiprocess Programs
IEEE Transactions on Computers
Middleware for a re-configurable distributed archival store based on secret sharing
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
A secure and efficient role-based access policy towards cryptographic cloud storage
WAIM'11 Proceedings of the 12th international conference on Web-age information management
Depot: Cloud Storage with Minimal Trust
ACM Transactions on Computer Systems (TOCS)
Designing a secure storage repository for sharing scientific datasets using public clouds
Proceedings of the second international workshop on Data intensive computing in the clouds
OAuth and ABE based authorization in semi-trusted cloud computing: aauth
Proceedings of the second international workshop on Data intensive computing in the clouds
Towards end-to-end secure content storage and delivery with public cloud
Proceedings of the second ACM conference on Data and Application Security and Privacy
On consistency of encrypted files
DISC'06 Proceedings of the 20th international conference on Distributed Computing
Collusion resistant broadcast encryption with short ciphertexts and private keys
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Secure key-updating for lazy revocation
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
City on the Sky: Extending XACML for Flexible, Secure Data Sharing on the Cloud
Journal of Grid Computing
News: EU questions stability of the Internet
Network Security
News: NSS uncovers firewall shortcomings
Network Security
Feature: DataVault: secure mobile access and data sharing
Network Security
Unity: secure and durable personal cloud storage
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Confidential information protection system for mobile devices
Security and Communication Networks
Iris: a scalable cloud file system with efficient integrity checks
Proceedings of the 28th Annual Computer Security Applications Conference
Authenticated storage using small trusted hardware
Proceedings of the 2013 ACM workshop on Cloud computing security workshop
Access control and query verification for untrusted databases
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
TMS: a trusted mail repository service using public storage clouds
Proceedings of the 8th Workshop on Middleware for Next Generation Internet Computing
Bolt: data management for connected homes
NSDI'14 Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
Hi-index | 0.00 |
Plutus is a cryptographic storage system that enables secure file sharing without placing much trust on the file servers. In particular, it makes novel use of cryptographic primitives to protect and share files. Plutus features highly scalable key management while allowing individual users to retain direct control over who gets access to their files. We explain the mechanisms in Plutus to reduce the number of cryptographic keys exchanged between users by using filegroups, distinguish file read and write access, handle user revocation efficiently, and allow an untrusted server to authorize file writes. We have built a prototype of Plutus on OpenAFS. Measurements of this prototype show that Plutus achieves strong security with overhead comparable to systems that encrypt all network traffic.