A major security concern with outsourcing data storage to third-party providers is authenticating the integrity and freshness of data. State-of-the-art software-based approaches require clients to main-tain state and cannot immediately detect forking attacks, while ap-proaches that introduce limited trusted hardware (e.g., a monotonic counter) at the storage server achieve low throughput. This pa-per proposes a new design for authenticating data storage using a small piece of high-performance trusted hardware attached to an untrusted server. The proposed design achieves significantly higher throughput than previous designs. The server-side trusted hardware allows clients to authenticate data integrity and freshness without keeping any mutab...
We put forward a symmetric encryption primitive tailored towards a specific application: outsourced ...
A service may be implemented over several servers, and those servers may become compromised by an at...
Abstract — The paper proposes a combined hardware/software approach for realizing high performance, ...
Abstract. We study the problem of authenticated storage, where we wish to construct protocols that a...
Outsourced storage has become more and more practical in recent years. Users can now store large amo...
So me emerging applications require programs to main-tain sensitive state o n untrusted hosts. Thi...
Computer security is of growing importance in the increasingly networked computing environment.This ...
Public cloud storage services are widely adopted for their scalability and low cost. However, delega...
Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of...
The amount of data generated by scientific and commercial applications is growing at an ever-increas...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to t...
With scalability, fault tolerance, ease of programming, and flexibility , MapReduce has gained many ...
Modern computer systems permit users to access protected information from remote locations. In certa...
In cloud storage, remote data integrity checking is critical. Clients may be compelled to check whet...
We put forward a symmetric encryption primitive tailored towards a specific application: outsourced ...
A service may be implemented over several servers, and those servers may become compromised by an at...
Abstract — The paper proposes a combined hardware/software approach for realizing high performance, ...
Abstract. We study the problem of authenticated storage, where we wish to construct protocols that a...
Outsourced storage has become more and more practical in recent years. Users can now store large amo...
So me emerging applications require programs to main-tain sensitive state o n untrusted hosts. Thi...
Computer security is of growing importance in the increasingly networked computing environment.This ...
Public cloud storage services are widely adopted for their scalability and low cost. However, delega...
Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of...
The amount of data generated by scientific and commercial applications is growing at an ever-increas...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to t...
With scalability, fault tolerance, ease of programming, and flexibility , MapReduce has gained many ...
Modern computer systems permit users to access protected information from remote locations. In certa...
In cloud storage, remote data integrity checking is critical. Clients may be compelled to check whet...
We put forward a symmetric encryption primitive tailored towards a specific application: outsourced ...
A service may be implemented over several servers, and those servers may become compromised by an at...
Abstract — The paper proposes a combined hardware/software approach for realizing high performance, ...