首页 > 最新文献

ACM International Workshop on Storage Security And Survivability最新文献

英文 中文
Improving secure long-term archival of digitally signed documents 改进数字签名文件的长期安全存档
Pub Date : 2008-10-31 DOI: 10.1145/1456469.1456476
C. Troncoso, D. D. Cock, B. Preneel
Long-term archival of signed documents presents specific challenges that do not need to be considered in short-term storage systems. In this paper we present a Secure Long-Term Archival System (SLTAS) that protects, in a verifiable way, the validity of today's digital signatures in a distant future. Moreover, our protocol is the first proposal that provides a proof of when a signature was created, without the possibility of backdating. We include a description of our scheme and an evaluation of its performance in terms of computing time and storage space. Finally, we discuss how to extend our system to achieve additional security properties. This paper does not focus on the long-term availability of archived information. nor on format migration problems.
签名文件的长期存档提出了短期存储系统中不需要考虑的特定挑战。在本文中,我们提出了一个安全的长期档案系统(SLTAS),以可验证的方式保护当今数字签名在遥远未来的有效性。此外,我们的协议是第一个提供签名创建时间证明的提案,没有回溯的可能性。我们对我们的方案进行了描述,并从计算时间和存储空间的角度对其性能进行了评估。最后,我们讨论了如何扩展我们的系统以获得额外的安全属性。本文不关注存档信息的长期可用性。也不涉及格式迁移问题。
{"title":"Improving secure long-term archival of digitally signed documents","authors":"C. Troncoso, D. D. Cock, B. Preneel","doi":"10.1145/1456469.1456476","DOIUrl":"https://doi.org/10.1145/1456469.1456476","url":null,"abstract":"Long-term archival of signed documents presents specific challenges that do not need to be considered in short-term storage systems. In this paper we present a Secure Long-Term Archival System (SLTAS) that protects, in a verifiable way, the validity of today's digital signatures in a distant future. Moreover, our protocol is the first proposal that provides a proof of when a signature was created, without the possibility of backdating. We include a description of our scheme and an evaluation of its performance in terms of computing time and storage space. Finally, we discuss how to extend our system to achieve additional security properties. This paper does not focus on the long-term availability of archived information. nor on format migration problems.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115953047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Efficient integrity checking of untrusted network storage 有效的完整性检查不受信任的网络存储
Pub Date : 2008-10-31 DOI: 10.1145/1456469.1456479
Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, R. Tamassia
Outsourced storage has become more and more practical in recent years. Users can now store large amounts of data in multiple servers at a relatively low price. An important issue for outsourced storage systems is to design an efficient scheme to assure users that their data stored at remote servers has not been tampered with. This paper presents a general method and a practical prototype application for verifying the integrity of files in an untrusted network storage service. The verification process is managed by an application running in a trusted environment (typically on the client) that stores just one cryptographic hash value of constant size, corresponding to the "digest" of an authenticated data structure. The proposed integrity verification service can work with any storage service since it is transparent to the storage technology used. Experimental results show that our integrity verification method is efficient and practical for network storage systems.
近年来,外包存储变得越来越实用。用户现在可以以相对较低的价格在多个服务器上存储大量数据。外包存储系统的一个重要问题是设计一个有效的方案,以确保用户存储在远程服务器上的数据没有被篡改。本文提出了一种验证不可信网络存储服务中文件完整性的一般方法和一个实际的原型应用。验证过程由运行在可信环境(通常在客户端)中的应用程序管理,该环境仅存储一个固定大小的加密散列值,对应于已验证数据结构的“摘要”。所建议的完整性验证服务可以与任何存储服务一起工作,因为它对所使用的存储技术是透明的。实验结果表明,该方法对网络存储系统的完整性验证是有效和实用的。
{"title":"Efficient integrity checking of untrusted network storage","authors":"Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, R. Tamassia","doi":"10.1145/1456469.1456479","DOIUrl":"https://doi.org/10.1145/1456469.1456479","url":null,"abstract":"Outsourced storage has become more and more practical in recent years. Users can now store large amounts of data in multiple servers at a relatively low price. An important issue for outsourced storage systems is to design an efficient scheme to assure users that their data stored at remote servers has not been tampered with. This paper presents a general method and a practical prototype application for verifying the integrity of files in an untrusted network storage service. The verification process is managed by an application running in a trusted environment (typically on the client) that stores just one cryptographic hash value of constant size, corresponding to the \"digest\" of an authenticated data structure. The proposed integrity verification service can work with any storage service since it is transparent to the storage technology used. Experimental results show that our integrity verification method is efficient and practical for network storage systems.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121234865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Robust remote data checking 强大的远程数据检查
Pub Date : 2008-10-31 DOI: 10.1145/1456469.1456481
Reza Curtmola, O. Khan, R. Burns
Remote data checking protocols, such as provable data possession (PDP) [1], allow clients that outsource data to untrusted servers to verify that the server continues to correctly store the data. Through the careful integration of forward error-correcting codes and remote data checking, a system can prove possession with arbitrarily high probability. We formalize this notion in the robust data possession guarantee. We distill the key performance and security requirements for integrating forward error-correcting codes into PDP and describe an encoding scheme and file organization for robust data possession that meets these requirements. We give a detailed analysis of this scheme and build a Monte-Carlo simulation to evaluate tradeoffs in reliability, space overhead, and performance. A practical way to evaluate these tradeoffs is an essential input to system design, allowing the designer to choose the encoding and data checking protocol parameters that realize robust data possession.
远程数据检查协议,如可证明数据占有(PDP)[1],允许将数据外包给不受信任的服务器的客户端验证服务器是否继续正确存储数据。通过前向纠错码和远程数据校验的精心集成,系统可以任意高概率地证明占有。我们在健壮的数据占有保证中形式化了这个概念。我们提炼了将前向纠错码集成到PDP中的关键性能和安全要求,并描述了满足这些要求的用于健壮数据占有的编码方案和文件组织。我们对该方案进行了详细的分析,并构建了蒙特卡罗模拟来评估可靠性、空间开销和性能方面的权衡。评估这些权衡的实用方法是系统设计的重要输入,允许设计者选择编码和数据检查协议参数,实现稳健的数据占有。
{"title":"Robust remote data checking","authors":"Reza Curtmola, O. Khan, R. Burns","doi":"10.1145/1456469.1456481","DOIUrl":"https://doi.org/10.1145/1456469.1456481","url":null,"abstract":"Remote data checking protocols, such as provable data possession (PDP) [1], allow clients that outsource data to untrusted servers to verify that the server continues to correctly store the data. Through the careful integration of forward error-correcting codes and remote data checking, a system can prove possession with arbitrarily high probability. We formalize this notion in the robust data possession guarantee. We distill the key performance and security requirements for integrating forward error-correcting codes into PDP and describe an encoding scheme and file organization for robust data possession that meets these requirements. We give a detailed analysis of this scheme and build a Monte-Carlo simulation to evaluate tradeoffs in reliability, space overhead, and performance. A practical way to evaluate these tradeoffs is an essential input to system design, allowing the designer to choose the encoding and data checking protocol parameters that realize robust data possession.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131686191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 113
Testable commitments 可测试的承诺
Pub Date : 2008-10-31 DOI: 10.1145/1456469.1456477
P. Golle, Richard Chow, Jessica Staddon
A key challenge in litigation is verifying that all relevant case content has been produced. Adding to the challenge is the fact that litigating parties are both bound to produce relevant documents and bound to protect private information (e.g. medical information). This leaves open the possibility of withholding content inappropriately, and verifying that this has not occurred is a time-consuming process involving the presiding judge. We introduce testable commitments: a cryptographic technique for verifying that only the right information has been withheld with only minimal involvement from a trusted third party. We present a construction of testable commitments and discuss its implementation.
诉讼中的一个关键挑战是核实所有相关的案件内容是否已经产生。更大的挑战是,诉讼各方既必须出示相关文件,又必须保护私人信息(例如医疗信息)。这就留下了不恰当地隐瞒内容的可能性,而核实这种情况没有发生是一个涉及主审法官的耗时过程。我们引入了可测试的承诺:一种加密技术,用于验证只有正确的信息被保留,而受信任的第三方的参与最少。我们提出了一个可测试承诺的结构,并讨论了它的实现。
{"title":"Testable commitments","authors":"P. Golle, Richard Chow, Jessica Staddon","doi":"10.1145/1456469.1456477","DOIUrl":"https://doi.org/10.1145/1456469.1456477","url":null,"abstract":"A key challenge in litigation is verifying that all relevant case content has been produced. Adding to the challenge is the fact that litigating parties are both bound to produce relevant documents and bound to protect private information (e.g. medical information). This leaves open the possibility of withholding content inappropriately, and verifying that this has not occurred is a time-consuming process involving the presiding judge. We introduce testable commitments: a cryptographic technique for verifying that only the right information has been withheld with only minimal involvement from a trusted third party. We present a construction of testable commitments and discuss its implementation.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122374473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When cryptography meets storage 当密码学遇到存储时
Pub Date : 2008-10-31 DOI: 10.1145/1456469.1456472
S. Diesburg, Christopher R. Meyers, David M. Lary, An-I Wang
Confidential data storage through encryption is becoming increasingly important. Designers and implementers of encryption methods of storage media must be aware that storage has different usage patterns and properties compared to securing other information media such as networks. In this paper, we empirically demonstrate two-time pad vulnerabilities in storage that are exposed via shifting file contents, in-place file updates, storage mechanisms hidden by layers of abstractions, inconsistencies between memory and disk content, and backups. We also demonstrate how a simple application of Bloom filters can automatically extract plaintexts from two-time pads. Further, our experience sheds light on system research directions to better support cryptographic assumptions and guarantees.
通过加密存储机密数据变得越来越重要。存储介质加密方法的设计者和实现者必须意识到,与保护其他信息介质(如网络)相比,存储具有不同的使用模式和属性。在本文中,我们通过经验证明了存储中的二次填充漏洞,这些漏洞可以通过移动文件内容、就地文件更新、抽象层隐藏的存储机制、内存和磁盘内容之间的不一致以及备份来暴露。我们还演示了一个简单的布隆过滤器应用程序如何自动从两个时间垫中提取明文。此外,我们的经验揭示了系统研究方向,以更好地支持加密假设和保证。
{"title":"When cryptography meets storage","authors":"S. Diesburg, Christopher R. Meyers, David M. Lary, An-I Wang","doi":"10.1145/1456469.1456472","DOIUrl":"https://doi.org/10.1145/1456469.1456472","url":null,"abstract":"Confidential data storage through encryption is becoming increasingly important. Designers and implementers of encryption methods of storage media must be aware that storage has different usage patterns and properties compared to securing other information media such as networks. In this paper, we empirically demonstrate two-time pad vulnerabilities in storage that are exposed via shifting file contents, in-place file updates, storage mechanisms hidden by layers of abstractions, inconsistencies between memory and disk content, and backups. We also demonstrate how a simple application of Bloom filters can automatically extract plaintexts from two-time pads. Further, our experience sheds light on system research directions to better support cryptographic assumptions and guarantees.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"17 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125787834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Configurable security for scavenged storage systems 清除存储系统的可配置安全性
Pub Date : 2008-10-31 DOI: 10.1145/1456469.1456480
Abdullah Gharaibeh, S. Al-Kiswany, M. Ripeanu
Scavenged storage systems harness unused disk space from individual workstations the same way idle CPU cycles are harnessed by desktop grid applications like Seti@Home. These systems provide a promising low cost, high-performance storage solution in certain high-end computing scenarios. However, selecting the security level and designing the security mechanisms for such systems is challenging as scavenging idle storage opens the door for security threats absent in traditional storage systems that use dedicated nodes under a single administrative domain. Moreover, increased security often comes at the price of performance and scalability. This paper develops a general threat model for systems that use scavenged storage, presents the design of a protocol that addresses these threats and is optimized for throughput, and evaluates the overheads brought by the new security protocol when configured to provide a number of different security properties.
清理的存储系统利用各个工作站未使用的磁盘空间,就像桌面网格应用程序(如Seti@Home)利用空闲的CPU周期一样。这些系统在某些高端计算场景中提供了有前途的低成本、高性能存储解决方案。然而,为这样的系统选择安全级别和设计安全机制是具有挑战性的,因为清除空闲存储为在单个管理域下使用专用节点的传统存储系统中不存在的安全威胁打开了大门。此外,提高安全性通常是以牺牲性能和可伸缩性为代价的。本文为使用清除存储的系统开发了一个通用的威胁模型,提出了一个解决这些威胁的协议的设计,并针对吞吐量进行了优化,并评估了新安全协议在配置为提供许多不同的安全属性时带来的开销。
{"title":"Configurable security for scavenged storage systems","authors":"Abdullah Gharaibeh, S. Al-Kiswany, M. Ripeanu","doi":"10.1145/1456469.1456480","DOIUrl":"https://doi.org/10.1145/1456469.1456480","url":null,"abstract":"Scavenged storage systems harness unused disk space from individual workstations the same way idle CPU cycles are harnessed by desktop grid applications like Seti@Home. These systems provide a promising low cost, high-performance storage solution in certain high-end computing scenarios. However, selecting the security level and designing the security mechanisms for such systems is challenging as scavenging idle storage opens the door for security threats absent in traditional storage systems that use dedicated nodes under a single administrative domain. Moreover, increased security often comes at the price of performance and scalability. This paper develops a general threat model for systems that use scavenged storage, presents the design of a protocol that addresses these threats and is optimized for throughput, and evaluates the overheads brought by the new security protocol when configured to provide a number of different security properties.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131551623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Secure data deduplication 安全的重复数据删除
Pub Date : 2008-10-31 DOI: 10.1145/1456469.1456471
M. Storer, K. Greenan, D. Long, E. L. Miller
As the world moves to digital storage for archival purposes, there is an increasing demand for systems that can provide secure data storage in a cost-effective manner. By identifying common chunks of data both within and between files and storing them only once, deduplication can yield cost savings by increasing the utility of a given amount of storage. Unfortunately, deduplication exploits identical content, while encryption attempts to make all content appear random; the same content encrypted with two different keys results in very different ciphertext. Thus, combining the space efficiency of deduplication with the secrecy aspects of encryption is problematic. We have developed a solution that provides both data security and space efficiency in single-server storage and distributed storage systems. Encryption keys are generated in a consistent manner from the chunk data; thus, identical chunks will always encrypt to the same ciphertext. Furthermore, the keys cannot be deduced from the encrypted chunk data. Since the information each user needs to access and decrypt the chunks that make up a file is encrypted using a key known only to the user, even a full compromise of the system cannot reveal which chunks are used by which users.
随着世界向档案目的的数字存储转移,对能够以经济有效的方式提供安全数据存储的系统的需求越来越大。通过识别文件内部和文件之间的公共数据块并只存储一次,重复数据删除可以通过增加给定存储量的效用来节省成本。不幸的是,重复数据删除利用相同的内容,而加密试图使所有内容看起来随机;用两个不同的密钥加密的相同内容会产生非常不同的密文。因此,将重复数据删除的空间效率与加密的保密性结合起来是有问题的。我们开发了一种解决方案,可以在单服务器存储和分布式存储系统中提供数据安全性和空间效率。加密密钥以一致的方式从块数据生成;因此,相同的块将始终加密为相同的密文。此外,密钥不能从加密的块数据中推断出来。由于每个用户访问和解密组成文件的块所需的信息是使用只有用户知道的密钥进行加密的,因此即使对系统进行全面攻击也无法显示哪些用户使用了哪些块。
{"title":"Secure data deduplication","authors":"M. Storer, K. Greenan, D. Long, E. L. Miller","doi":"10.1145/1456469.1456471","DOIUrl":"https://doi.org/10.1145/1456469.1456471","url":null,"abstract":"As the world moves to digital storage for archival purposes, there is an increasing demand for systems that can provide secure data storage in a cost-effective manner. By identifying common chunks of data both within and between files and storing them only once, deduplication can yield cost savings by increasing the utility of a given amount of storage. Unfortunately, deduplication exploits identical content, while encryption attempts to make all content appear random; the same content encrypted with two different keys results in very different ciphertext. Thus, combining the space efficiency of deduplication with the secrecy aspects of encryption is problematic.\u0000 We have developed a solution that provides both data security and space efficiency in single-server storage and distributed storage systems. Encryption keys are generated in a consistent manner from the chunk data; thus, identical chunks will always encrypt to the same ciphertext. Furthermore, the keys cannot be deduced from the encrypted chunk data. Since the information each user needs to access and decrypt the chunks that make up a file is encrypted using a key known only to the user, even a full compromise of the system cannot reveal which chunks are used by which users.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115268976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 347
Designing a secure reliable file system for sensor networks 设计一个安全可靠的传感器网络文件系统
Pub Date : 2007-10-29 DOI: 10.1145/1314313.1314319
N. Bhatnagar, E. L. Miller
Wireless sensor networks are increasingly being used to monitor habitats, analyze traffic patterns, study troop movements, and gather data for reconnaissance and surveillance missions. Many wireless sensor networks require the protection of their data from unauthorized access and malicious tampering, motivating the need for a secure and reliable file system for sensor nodes. The file system presented in this paper encrypts data stored on sensor nodes' local storage in such a way that an intruder who compromises a sensor node cannot read it, and backs it up regularly on to its neighbor nodes. The file system utilizes algebraic signatures to detect data tampering.
无线传感器网络越来越多地被用于监测栖息地、分析交通模式、研究部队调动以及为侦察和监视任务收集数据。许多无线传感器网络需要保护其数据免受未经授权的访问和恶意篡改,这就需要为传感器节点提供安全可靠的文件系统。本文提出的文件系统对存储在传感器节点本地存储的数据进行加密,使得入侵传感器节点的入侵者无法读取数据,并定期将数据备份到相邻节点上。文件系统利用代数签名来检测数据篡改。
{"title":"Designing a secure reliable file system for sensor networks","authors":"N. Bhatnagar, E. L. Miller","doi":"10.1145/1314313.1314319","DOIUrl":"https://doi.org/10.1145/1314313.1314319","url":null,"abstract":"Wireless sensor networks are increasingly being used to monitor habitats, analyze traffic patterns, study troop movements, and gather data for reconnaissance and surveillance missions. Many wireless sensor networks require the protection of their data from unauthorized access and malicious tampering, motivating the need for a secure and reliable file system for sensor nodes. The file system presented in this paper encrypts data stored on sensor nodes' local storage in such a way that an intruder who compromises a sensor node cannot read it, and backs it up regularly on to its neighbor nodes. The file system utilizes algebraic signatures to detect data tampering.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122673643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Exploiting type-awareness in a self-recovering disk 利用自恢复磁盘中的类型感知
Pub Date : 2007-10-29 DOI: 10.1145/1314313.1314321
Kiron Vijayasankar, Gopalan Sivathanu, S. Sundararaman, E. Zadok
Data recoverability in the face of partial disk errors is an important prerequisite in modern storage. We have designed and implemented a prototype disk system that automatically ensures the integrity of stored data, and transparently recovers vital data in the event of integrity violations. We show that by using pointer knowledge, effective integrity assurance can be performed inside a block-based disk with negligible performance overheads. We also show how semantics-aware replication of blocks can help improve the recoverability of data in the event of partial disk errors with small space overheads. Our evaluation results show that for normal user workloads, our disk system has a performance overhead of only 1-5% compared to traditional disks.
面对部分磁盘错误的数据可恢复性是现代存储的一个重要前提。我们设计并实现了一个原型磁盘系统,该系统可以自动确保存储数据的完整性,并在违反完整性的情况下透明地恢复重要数据。我们表明,通过使用指针知识,可以在基于块的磁盘内执行有效的完整性保证,而性能开销可以忽略不计。我们还展示了在发生部分磁盘错误时,块的语义感知复制如何以较小的空间开销帮助提高数据的可恢复性。我们的评估结果表明,对于普通用户工作负载,与传统磁盘相比,我们的磁盘系统的性能开销仅为1-5%。
{"title":"Exploiting type-awareness in a self-recovering disk","authors":"Kiron Vijayasankar, Gopalan Sivathanu, S. Sundararaman, E. Zadok","doi":"10.1145/1314313.1314321","DOIUrl":"https://doi.org/10.1145/1314313.1314321","url":null,"abstract":"Data recoverability in the face of partial disk errors is an important prerequisite in modern storage. We have designed and implemented a prototype disk system that automatically ensures the integrity of stored data, and transparently recovers vital data in the event of integrity violations. We show that by using pointer knowledge, effective integrity assurance can be performed inside a block-based disk with negligible performance overheads. We also show how semantics-aware replication of blocks can help improve the recoverability of data in the event of partial disk errors with small space overheads. Our evaluation results show that for normal user workloads, our disk system has a performance overhead of only 1-5% compared to traditional disks.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125922275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Round-trip privacy with nfsv4 使用nfsv4的往返隐私
Pub Date : 2007-10-29 DOI: 10.1145/1314313.1314315
Avishay Traeger, Kumar Thangavelu, E. Zadok
With the advent of NFS version 4, NFS security is more important than ever. This is because a main goal of the NFSv4 protocol is suitability for use on the Internet, whereas previous versions were used mainly on private networks. To address these security concerns, the NFSv4 protocol utilizes the RPCSEC GSS protocol and allows clients and servers to negotiate security at mount-time. However, this provides privacy only while data is traveling over the wire. We believe that file servers accessible over the Internet should contain only encrypted data. We present a round-trip privacy scheme for NFSv4, where clients encrypt file data for write requests, and decrypt the data for read requests. The data stored by the server on behalf of the clients is encrypted. This helps ensure privacy if the server or storage is stolen or compromised. As the NFSv4 protocol was designed with extensibility, it is the ideal place to add roundtrip privacy. In addition to providing a higher level of security than only over-the-wire encryption, our technique is more efficient, as the server is relieved from performing encryption and decryption. We developed a prototype of our round-trip privacy scheme. In our performance evaluation, we saw throughput increases of up to 24%, as well as good scalability.
随着NFS版本4的出现,NFS安全性比以往任何时候都更加重要。这是因为NFSv4协议的主要目标是适合在Internet上使用,而以前的版本主要用于专用网络。为了解决这些安全问题,NFSv4协议利用RPCSEC GSS协议,并允许客户端和服务器在挂载时协商安全性。然而,这只在数据通过网络传输时提供隐私。我们认为,通过互联网访问的文件服务器应该只包含加密的数据。我们提出了一个NFSv4的双向隐私方案,其中客户端为写请求加密文件数据,并为读请求解密数据。服务器代表客户端存储的数据是加密的。这有助于在服务器或存储被盗或受损时确保隐私。由于NFSv4协议具有可扩展性,因此它是添加往返隐私的理想场所。除了提供比线上加密更高级别的安全性之外,我们的技术更高效,因为服务器不再需要执行加密和解密。我们开发了一个往返隐私方案的原型。在我们的性能评估中,我们看到吞吐量增加了24%,并且具有良好的可伸缩性。
{"title":"Round-trip privacy with nfsv4","authors":"Avishay Traeger, Kumar Thangavelu, E. Zadok","doi":"10.1145/1314313.1314315","DOIUrl":"https://doi.org/10.1145/1314313.1314315","url":null,"abstract":"With the advent of NFS version 4, NFS security is more important than ever. This is because a main goal of the NFSv4 protocol is suitability for use on the Internet, whereas previous versions were used mainly on private networks. To address these security concerns, the NFSv4 protocol utilizes the RPCSEC GSS protocol and allows clients and servers to negotiate security at mount-time. However, this provides privacy only while data is traveling over the wire.\u0000 We believe that file servers accessible over the Internet should contain only encrypted data. We present a round-trip privacy scheme for NFSv4, where clients encrypt file data for write requests, and decrypt the data for read requests. The data stored by the server on behalf of the clients is encrypted. This helps ensure privacy if the server or storage is stolen or compromised. As the NFSv4 protocol was designed with extensibility, it is the ideal place to add roundtrip privacy. In addition to providing a higher level of security than only over-the-wire encryption, our technique is more efficient, as the server is relieved from performing encryption and decryption. We developed a prototype of our round-trip privacy scheme. In our performance evaluation, we saw throughput increases of up to 24%, as well as good scalability.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121828887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
ACM International Workshop on Storage Security And Survivability
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1