A cryptographic file system for UNIX
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Low-Latency, Concurrent Checkpointing for Parallel Programs
IEEE Transactions on Parallel and Distributed Systems
The Packet Vault: Secure Storage of Network Data
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
Reliable Probabilistic Checkpointing
PRDC '99 Proceedings of the 1999 Pacific Rim International Symposium on Dependable Computing
Checkpointing and Its Applications
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Libckpt: transparent checkpointing under Unix
TCON'95 Proceedings of the USENIX 1995 Technical Conference Proceedings
Cryptographic support for secure logs on untrusted machines
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Secure deletion of data from magnetic and solid-state memory
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Adaptive incremental checkpointing for massively parallel systems
Proceedings of the 18th annual international conference on Supercomputing
Hi-index | 0.02 |
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, banking, and stock trading, where privacy and integrity of data are as important as the uninterrupted operation of the service provided. While much attention has been paid to the protection of data explicitly communicated over the Internet, there are also other sources of information leakage that must be addressed. This paper addresses one such source of information leakage caused by checkpointing, which is a common method used to provide continued operation in the presence of faults.Checkpointing requires the communication of memory state information, which may contain sensitive data, over the network to a reliable backing store. Although the method of encrypting all of this memory state information can protect the data, such a simplistic method is an overkill that can result in a significant slowdown of the target application. A much more efficient method is to use incremental checkpointing (IC), in which only the modified memory data is saved in stable storage. This paper examines ways to combine the operations required to perform IC with those required to encrypt this memory state data. Our analysis show that the proposed secure checkpointing schemes increase the overhead by 1.57 when compred to conventional checkpointing schemes, which shows the proposed schemes are feasible.