Fault tolerant and secure distributed data storage systems typically require that only up to a threshold of storage nodes can ever be compromised or fail. In proactively-secure systems, this requirement is modified to hold only in a time interval (also called epoch), resulting in increased security. An attacker or adversary could compromise distinct sets of nodes in any two time intervals. This attack model is also called the mobile adversary model. Proactively-secure systems require all nodes to "refresh" themselves periodically to a clean state to maintain the availability, integrity, and confidentiality properties of the data storage service. This dissertation investigates the design of a proactively-secure distributed data storage ...
As computers become pervasive in environments that include the home and community, new applications ...
This thesis explores architectural level optimizations to make secure systems more efficient, secure...
As computers become pervasive in environments like the home and community, data repositories that c...
AbstractThe trend towards self-organization of systems like peer-to-peer or ad hoc networks generate...
We present the design of a distributed store that offers various levels of security guarantees whil...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
We discuss the design and evaluation of a secure and fault tolerant storage infrastructure for un-tr...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
As computers become pervasive in environments that include the home and community, new applications ...
This paper addresses the problem of using proactive cryptosystems for generic data storage and retri...
AbstractIn his well-known Information Dispersal Algorithm paper, Rabin showed a way to distribute in...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
As computers become pervasive in environments that include the home and community, new applications ...
This thesis explores architectural level optimizations to make secure systems more efficient, secure...
As computers become pervasive in environments like the home and community, data repositories that c...
AbstractThe trend towards self-organization of systems like peer-to-peer or ad hoc networks generate...
We present the design of a distributed store that offers various levels of security guarantees whil...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
We discuss the design and evaluation of a secure and fault tolerant storage infrastructure for un-tr...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
As computers become pervasive in environments that include the home and community, new applications ...
This paper addresses the problem of using proactive cryptosystems for generic data storage and retri...
AbstractIn his well-known Information Dispersal Algorithm paper, Rabin showed a way to distribute in...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
As computers become pervasive in environments that include the home and community, new applications ...
This thesis explores architectural level optimizations to make secure systems more efficient, secure...
As computers become pervasive in environments like the home and community, data repositories that c...