A protocol for simultaneous use of confidentiality and integrity in large-scale storage systems

  • Authors:
  • Zahra Khani;Reza Azmi

  • Affiliations:
  • Alzahra Univeristy, Tehran, Iran;Alzahra University, Tehran, Iran

  • Venue:
  • Proceedings of the 6th International Conference on Security of Information and Networks
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Large-scale storage systems often contain sensitive information such as medical information in healthcare services, captured traffic in large companies like Internet Service Providers, or personal user information which is stored by different firms. Most of these systems are distributed geographically and data should be able to move between systems in different places, which mean we cannot protect data by limiting them to internal access. Even internal access is not adequate to provide security because we cannot fully trust every operator who has physical access to systems. In this paper we propose a new approach which provides both confidentiality and integrity for large datasets by combining keyed hash tree (KHT) and Merkle hash tree. In addition, we introduce a hash value and key exchange protocol. Theoretical and experimental analysis shows that it is a practical and scalable way to protect large-scale datasets against modification and theft.