Claudius Stern, Philipp Adelt, Volker Krummel, Marcel R. Ackermann
{"title":"来自不受信任存储服务的数据完整性的可靠证据","authors":"Claudius Stern, Philipp Adelt, Volker Krummel, Marcel R. Ackermann","doi":"10.1109/ICNS.2008.28","DOIUrl":null,"url":null,"abstract":"Digital storage demand is growing with the increasing use of digital artifacts from media files to business documents. Regulatory frameworks ask for unaltered, durable storage of business communications. In this paper we consider the problem of getting reliable evidence of the integrity and existence of some data from a storage service even if the data is not available for reference anymore and even if the partner may be untrustworthy or malicious. Several solutions are presented, among them the first cryptographically secure approach providing evidence of the integrity of remotely stored data, without owning or transferring the complete original data.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Reliable Evidence of Data Integrity from an Untrusted Storage Service\",\"authors\":\"Claudius Stern, Philipp Adelt, Volker Krummel, Marcel R. Ackermann\",\"doi\":\"10.1109/ICNS.2008.28\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital storage demand is growing with the increasing use of digital artifacts from media files to business documents. Regulatory frameworks ask for unaltered, durable storage of business communications. In this paper we consider the problem of getting reliable evidence of the integrity and existence of some data from a storage service even if the data is not available for reference anymore and even if the partner may be untrustworthy or malicious. Several solutions are presented, among them the first cryptographically secure approach providing evidence of the integrity of remotely stored data, without owning or transferring the complete original data.\",\"PeriodicalId\":180899,\"journal\":{\"name\":\"Fourth International Conference on Networking and Services (icns 2008)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-03-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Fourth International Conference on Networking and Services (icns 2008)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNS.2008.28\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fourth International Conference on Networking and Services (icns 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNS.2008.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Reliable Evidence of Data Integrity from an Untrusted Storage Service
Digital storage demand is growing with the increasing use of digital artifacts from media files to business documents. Regulatory frameworks ask for unaltered, durable storage of business communications. In this paper we consider the problem of getting reliable evidence of the integrity and existence of some data from a storage service even if the data is not available for reference anymore and even if the partner may be untrustworthy or malicious. Several solutions are presented, among them the first cryptographically secure approach providing evidence of the integrity of remotely stored data, without owning or transferring the complete original data.