A cryptographic network file system has to guarantee confidentiality and integrity of its files, and also it has to support random access. For this purpose, existing designs mainly rely on(often ad-hoc) combination of Merkle hash tree with a block cipher mode of encryption. In this paper, we propose a new design based on a MAC tree construction which uses a universal-hash based stateful MAC. This new design enables standard model security proof and also better performance compared with Merkle hash tree. We formally define the security notions for file encryption and prove that our scheme provides both confidentiality and integrity. We implement our scheme in coreFS, a user-level network file system, and evaluate the performance in compariso...
Storing information such as data backups or family pictures on third party servers instead of local ...
Abstract—Cloud storage systems have received extensive atten-tion in recent years. Many individuals ...
Using the cloud to store data offers many advantages for businesses and individuals alike. The cloud...
In this paper we propose two new constructions for pro-tecting the integrity of files in cryptograph...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to t...
With the successful proliferation of data outsourcing services, security and privacy issues have dra...
Data sharing with multiple parties over a third-party distribution framework requires that both data...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
Today, major IT-companies, such as Microsoft, Amazon and Google, are offering online storage service...
Abstract—Governments, military, different private organiza-tions, financial institutions and hospita...
Abstract A crucial element of distributed cryptographic file systems are key management solutions th...
A secure, tamper proof execution environment is critical for trustworthy network computing. Newly ...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Storing information such as data backups or family pictures on third party servers instead of local ...
Abstract—Cloud storage systems have received extensive atten-tion in recent years. Many individuals ...
Using the cloud to store data offers many advantages for businesses and individuals alike. The cloud...
In this paper we propose two new constructions for pro-tecting the integrity of files in cryptograph...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to t...
With the successful proliferation of data outsourcing services, security and privacy issues have dra...
Data sharing with multiple parties over a third-party distribution framework requires that both data...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
Today, major IT-companies, such as Microsoft, Amazon and Google, are offering online storage service...
Abstract—Governments, military, different private organiza-tions, financial institutions and hospita...
Abstract A crucial element of distributed cryptographic file systems are key management solutions th...
A secure, tamper proof execution environment is critical for trustworthy network computing. Newly ...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Storing information such as data backups or family pictures on third party servers instead of local ...
Abstract—Cloud storage systems have received extensive atten-tion in recent years. Many individuals ...
Using the cloud to store data offers many advantages for businesses and individuals alike. The cloud...