Authenticated storage using small trusted hardware

A major security concern with outsourcing data storage to third-party providers is authenticating the integrity and freshness of data. State-of-the-art software-based approaches require clients to maintain state and cannot immediately detect forking attacks, while approaches that introduce limited t...

Full description

Bibliographic Details
Main Authors: Yang, Hsin-Jung (Contributor), Zeldovich, Nickolai (Contributor), Devadas, Srinivas (Contributor), Costan, Victor Marius (Contributor)
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory (Contributor), Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science (Contributor)
Format: Article
Language:English
Published: Association for Computing Machinery (ACM), 2014-04-14T17:56:32Z.
Subjects:
Online Access:Get fulltext
LEADER 02062 am a22002533u 4500
001 86161
042 |a dc 
100 1 0 |a Yang, Hsin-Jung  |e author 
100 1 0 |a Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory  |e contributor 
100 1 0 |a Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science  |e contributor 
100 1 0 |a Yang, Hsin-Jung  |e contributor 
100 1 0 |a Costan, Victor Marius  |e contributor 
100 1 0 |a Zeldovich, Nickolai  |e contributor 
100 1 0 |a Devadas, Srinivas  |e contributor 
700 1 0 |a Zeldovich, Nickolai  |e author 
700 1 0 |a Devadas, Srinivas  |e author 
700 1 0 |a Costan, Victor Marius  |e author 
245 0 0 |a Authenticated storage using small trusted hardware 
260 |b Association for Computing Machinery (ACM),   |c 2014-04-14T17:56:32Z. 
856 |z Get fulltext  |u http://hdl.handle.net/1721.1/86161 
520 |a A major security concern with outsourcing data storage to third-party providers is authenticating the integrity and freshness of data. State-of-the-art software-based approaches require clients to maintain state and cannot immediately detect forking attacks, while approaches that introduce limited trusted hardware (e.g., a monotonic counter) at the storage server achieve low throughput. This paper proposes a new design for authenticating data storage using a small piece of high-performance trusted hardware attached to an untrusted server. The proposed design achieves significantly higher throughput than previous designs. The server-side trusted hardware allows clients to authenticate data integrity and freshness without keeping any mutable client-side state. Our design achieves high performance by parallelizing server-side authentication operations and permitting the untrusted server to maintain caches and schedule disk writes, while enforcing precise crash recovery and write access control. 
546 |a en_US 
655 7 |a Article 
773 |t Proceedings of the 2013 ACM workshop on Cloud computing security workshop (CCSW '13)