Integrity checking in cryptographic file systems with constant trusted storage

被引:0
|
作者
Oprea, Alina [1 ]
Reiter, Michael K. [1 ,2 ]
机构
[1] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
[2] Carnegie Mellon Univ, Elect & Comp Engn Dept, Pittsburgh, PA 15213 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose two new constructions for protecting the integrity of files in cryptographic file systems. Our constructions are designed to exploit two characteristics of many file-system workloads, namely low entropy of file contents and high sequentiality of file block writes. At the same time, our approaches maintain the best features of the most commonly used algorithm today (Merkle trees), including defense against replay of stale (previously overwritten) blocks and a small, constant amount of trusted storage per file. Via implementations in the EncFS cryptographic file system, we evaluate the performance and storage requirements of our new constructions compared to those of Merkle trees. We conclude with guidelines for choosing the best integrity algorithm depending on typical application workload.
引用
收藏
页码:183 / +
页数:3
相关论文
共 50 条
  • [1] Model checking of trusted cryptographic module
    Chen, Xiao-Feng
    Feng, Deng-Guo
    Tongxin Xuebao/Journal on Communications, 2010, 31 (01): : 59 - 64
  • [2] Cloud Storage Cost Modeling for Cryptographic File Systems
    Storch, Mauro
    De Rose, Cesar A. F.
    2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017), 2017, : 9 - 14
  • [3] CRYPTOGRAPHIC FILE STORAGE.
    King, David
    ICL technical journal, 1987, 5 (04): : 699 - 709
  • [4] Improving Data Integrity and Performance of Cryptographic Structured Log File Systems
    Daci, Genti
    Shyle, Megi
    ICT INNOVATIONS 2011, 2011, 150 : 73 - 83
  • [5] Cryptographic Public Verification of Data Integrity for Cloud Storage Systems
    Zhang, Yuan
    Xu, Chunxiang
    Li, Hongwei
    Liang, Xiaohui
    IEEE CLOUD COMPUTING, 2016, 3 (05): : 44 - 52
  • [6] An architecture for on-the-fly file integrity checking
    Borchardt, M
    Maziero, C
    Jamhour, E
    DEPENDABLE COMPUTING, 2003, 2847 : 117 - 126
  • [7] Modern approaches to file system integrity checking
    Kaczmarek, Jerzy
    Wrobel, Michal
    PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 403 - 406
  • [8] Lazy revocation in cryptographic file systems
    Backes, Michael
    Cachin, Christian
    Oprea, Alina
    THIRD INTERNATIONAL IEEE SECURITY IN STORAGE WORKSHOP, PROCEEDINGS, 2006, : 1 - +
  • [9] A trusted versioning file system for passive mobile storage devices
    Catuogno, Luigi
    Loehr, Hans
    Winandy, Marcel
    Sadeghi, Ahmad-Reza
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 38 : 65 - 75
  • [10] A Hybrid Cryptographic Technique for File Storage Mechanism Over Cloud
    Sharma, Shivam
    Singla, Kanav
    Rathee, Geetanjali
    Saini, Hemraj
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 241 - 256