Authenticated storage using small trusted hardware

A major security concern with outsourcing data storage to third-party providers is authenticating the integrity and freshness of data. State-of-the-art software-based approaches require clients to maintain state and cannot immediately detect forking attacks, while approaches that introduce limited t...

Full description

Bibliographic Details
Main Authors: Yang, Hsin-Jung (Contributor), Zeldovich, Nickolai (Contributor), Devadas, Srinivas (Contributor), Costan, Victor Marius (Contributor)
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory (Contributor), Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science (Contributor)
Format: Article
Language:English
Published: Association for Computing Machinery (ACM), 2014-04-14T17:56:32Z.
Subjects:
Online Access:Get fulltext