|
|
|
|
LEADER |
02062 am a22002533u 4500 |
001 |
86161 |
042 |
|
|
|a dc
|
100 |
1 |
0 |
|a Yang, Hsin-Jung
|e author
|
100 |
1 |
0 |
|a Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
|e contributor
|
100 |
1 |
0 |
|a Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
|e contributor
|
100 |
1 |
0 |
|a Yang, Hsin-Jung
|e contributor
|
100 |
1 |
0 |
|a Costan, Victor Marius
|e contributor
|
100 |
1 |
0 |
|a Zeldovich, Nickolai
|e contributor
|
100 |
1 |
0 |
|a Devadas, Srinivas
|e contributor
|
700 |
1 |
0 |
|a Zeldovich, Nickolai
|e author
|
700 |
1 |
0 |
|a Devadas, Srinivas
|e author
|
700 |
1 |
0 |
|a Costan, Victor Marius
|e author
|
245 |
0 |
0 |
|a Authenticated storage using small trusted hardware
|
260 |
|
|
|b Association for Computing Machinery (ACM),
|c 2014-04-14T17:56:32Z.
|
856 |
|
|
|z Get fulltext
|u http://hdl.handle.net/1721.1/86161
|
520 |
|
|
|a A major security concern with outsourcing data storage to third-party providers is authenticating the integrity and freshness of data. State-of-the-art software-based approaches require clients to maintain state and cannot immediately detect forking attacks, while approaches that introduce limited trusted hardware (e.g., a monotonic counter) at the storage server achieve low throughput. This paper proposes a new design for authenticating data storage using a small piece of high-performance trusted hardware attached to an untrusted server. The proposed design achieves significantly higher throughput than previous designs. The server-side trusted hardware allows clients to authenticate data integrity and freshness without keeping any mutable client-side state. Our design achieves high performance by parallelizing server-side authentication operations and permitting the untrusted server to maintain caches and schedule disk writes, while enforcing precise crash recovery and write access control.
|
546 |
|
|
|a en_US
|
655 |
7 |
|
|a Article
|
773 |
|
|
|t Proceedings of the 2013 ACM workshop on Cloud computing security workshop (CCSW '13)
|