Long-term threats to secure archives
Proceedings of the second ACM workshop on Storage security and survivability
Designing a secure reliable file system for sensor networks
Proceedings of the 2007 ACM workshop on Storage security and survivability
Provable data possession at untrusted stores
Proceedings of the 14th ACM conference on Computer and communications security
PRIMS: making NVRAM suitable for extremely reliable storage
HotDep'07 Proceedings of the 3rd workshop on on Hot Topics in System Dependability
Auditing to keep online storage services honest
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
POTSHARDS: secure long-term storage without encryption
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Pergamum: replacing tape with energy efficient, reliable, disk-based archival storage
FAST'08 Proceedings of the 6th USENIX Conference on File and Storage Technologies
Efficient integrity checking of untrusted network storage
Proceedings of the 4th ACM international workshop on Storage security and survivability
Proceedings of the 4th ACM international workshop on Storage security and survivability
Scalable and efficient provable data possession
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Publicly Verifiable Remote Data Integrity
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory
IWSOS '08 Proceedings of the 3rd International Workshop on Self-Organizing Systems
Compact Proofs of Retrievability
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
POTSHARDS—a secure, recoverable, long-term archival storage system
ACM Transactions on Storage (TOS)
HAIL: a high-availability and integrity layer for cloud storage
Proceedings of the 16th ACM conference on Computer and communications security
Dynamic provable data possession
Proceedings of the 16th ACM conference on Computer and communications security
Maintaining and checking parity in highly available Scalable Distributed Data Structures
Journal of Systems and Software
A comprehensive reference architecture for trustworthy long-term archiving of sensitive data
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Data protection models for service provisioning in the cloud
Proceedings of the 15th ACM symposium on Access control models and technologies
Enabling public verifiability and data dynamics for storage security in cloud computing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Enabling data storage security in cloud computing for banking enterprise
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
Remote data checking using provable data possession
ACM Transactions on Information and System Security (TISSEC)
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
ACM Transactions on Sensor Networks (TOSN)
Dark clouds on the horizon: using cloud storage as attack vector and online slack space
SEC'11 Proceedings of the 20th USENIX conference on Security
Multimedia Tools and Applications
Proceedings of the 2012 ACM conference on Computer and communications security
Geolocation of data in the cloud
Proceedings of the third ACM conference on Data and application security and privacy
Adaptive data protection in distributed systems
Proceedings of the third ACM conference on Data and application security and privacy
Using algebraic signatures to check data possession in cloud storage
Future Generation Computer Systems
Adaptive data management for self-protecting objects in cloud computing systems
Proceedings of the 8th International Conference on Network and Service Management
DepSky: Dependable and Secure Storage in a Cloud-of-Clouds
ACM Transactions on Storage (TOS)
Data dynamics for remote data possession checking in cloud storage
Computers and Electrical Engineering
Hi-index | 0.00 |
The emerging use of the Internet for remote storage and backup has led to the problem of verifying that storage sites in a distributed system indeed store the data; this must often be done in the absence of knowledge of what the data should be. We use m/n erasure-correcting coding to safeguard the stored data and use algebraic signatures hash functions with algebraic properties for verification. Our scheme primarily utilizes one such algebraic property: taking a signature of parity gives the same result as taking the parity of the signatures. To make our scheme collusionresistant, we blind data and parity by XORing them with a pseudo-random stream. Our scheme has three advantages over existing techniques. First, it uses only small messages for verification, an attractive property in a P2P setting where the storing peers often only have a small upstream pipe. Second, it allows verification of challenges across random data without the need for the challenger to compare against the original data. Third, it is highly resistant to coordinated attempts to undetectably modify data. These signature techniques are very fast, running at tens to hundreds of megabytes per second. Because of these properties, the use of algebraic signatures will permit the construction of large-scale distributed storage systems in which large amounts of storage can be verified with minimal network bandwidth.