A case for redundant arrays of inexpensive disks (RAID)
SIGMOD '88 Proceedings of the 1988 ACM SIGMOD international conference on Management of data
Network security: private communication in a public world
Network security: private communication in a public world
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The SDSC storage resource broker
CASCON '98 Proceedings of the 1998 conference of the Centre for Advanced Studies on Collaborative research
Trustworthy 100-year digital objects: Evidence after every witness is dead
ACM Transactions on Information Systems (TOIS)
The LOCKSS peer-to-peer digital preservation system
ACM Transactions on Computer Systems (TOCS)
Ensuring data integrity in storage: techniques and applications
Proceedings of the 2005 ACM workshop on Storage security and survivability
Perspectives for cryptographic long-term security
Communications of the ACM - Privacy and security in highly dynamic systems
Finding collisions in the full SHA-1
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
How to break MD5 and other hash functions
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Hi-index | 0.00 |
A large portion of the government, business, cultural, and scientific digital data being created today needs to be archived and preserved for future use of periods ranging from a few years to decades and sometimes centuries. A fundamental requirement of a long term archive is to ensure the integrity of its holdings. In this paper, we develop a new methodology to address the integrity of long term archives using rigorous cryptographic techniques. Our approach involves the generation of a small-size integrity token for each digital object to be archived, and some cryptographic summary information based on all the objects handled within a dynamic time period. We present a framework that enables the continuous auditing of the holdings of the archive depending on the policy set by the archive. Moreover, an independent auditor will be able to verify the integrity of every version of an archived digital object as well as link the current version to the original form of the object when it was ingested into the archive. We built a prototype system that is completely independent of the archive's underlying architecture, and tested it on large scale data. We include in this paper some preliminary results on the validation and performance of our prototype.