Toward securing untrusted storage without public-key operations

  • Authors:
  • Dalit Naor;Amir Shenhav;Avishai Wool

  • Affiliations:
  • IBM Haifa Research Lab, Tel-Aviv, Israel;Tel-Aviv University;Tel-Aviv University

  • Venue:
  • Proceedings of the 2005 ACM workshop on Storage security and survivability
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, widely used in such file systems, are known to have worse performance than their symmetric key counterparts. In this paper we examine design alternatives that avoid public-key cryptography operations to achieve better performance. We present the trade-offs and limitations that are introduced by these substitutions.