Integrity checking in cryptographic file systems with constant trusted storage

被引:0
|
作者
Oprea, Alina [1 ]
Reiter, Michael K. [1 ,2 ]
机构
[1] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
[2] Carnegie Mellon Univ, Elect & Comp Engn Dept, Pittsburgh, PA 15213 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose two new constructions for protecting the integrity of files in cryptographic file systems. Our constructions are designed to exploit two characteristics of many file-system workloads, namely low entropy of file contents and high sequentiality of file block writes. At the same time, our approaches maintain the best features of the most commonly used algorithm today (Merkle trees), including defense against replay of stale (previously overwritten) blocks and a small, constant amount of trusted storage per file. Via implementations in the EncFS cryptographic file system, we evaluate the performance and storage requirements of our new constructions compared to those of Merkle trees. We conclude with guidelines for choosing the best integrity algorithm depending on typical application workload.
引用
收藏
页码:183 / +
页数:3
相关论文
共 50 条
  • [21] Tribology of file storage systems
    Miyake, Shojiro
    Toraibarojisuto/Journal of Japanese Society of Tribologists, 40 (01):
  • [22] Towards constant bandwidth overhead integrity checking of untrusted data
    Clarke, D
    Suh, GE
    Gassend, B
    Sudan, A
    van Dijk, M
    Devadas, S
    2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 139 - 153
  • [23] Zero knowledge Proofs for Cloud Storage Integrity Checking
    Zhang, Faen
    Fan, Xinyu
    Lei, Xiang
    Wu, Jiahong
    Song, Jianfei
    Huang, Jiashui
    Guo, Jingming
    Tong, Chao
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7661 - 7668
  • [24] Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules
    Tidrea, Alexandra
    Korodi, Adrian
    Silea, Ioan
    SENSORS, 2019, 19 (19)
  • [25] Comprehensive Robustness Evaluation of File Systems with Model Checking
    Yuan, Jingcheng
    Aoki, Toshiaki
    Guo, Xiaoyun
    2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS 2020), 2020, : 99 - 110
  • [26] Protecting the integrity of trusted applications in mobile phone systems
    Muthukumaran, Divya
    Schiffman, Joshua
    Hassan, Mohamed
    Sawani, Anuj
    Rao, Vikhyath
    Jaeger, Trent
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (06) : 633 - 650
  • [27] Enabling blockchain-assisted certificateless public integrity checking for industrial cloud storage systems
    Liu, Qing
    Zhang, Xiaojun
    Xue, Jingting
    Zhou, Rang
    Wang, Xin
    Tang, Wei
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 140
  • [28] INTEGRITY AND THE AUDIT OF TRUSTED DATABASE-MANAGEMENT SYSTEMS
    FILSINGER, J
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1993, 21 : 349 - 365
  • [29] Distributed integrity checking for systems with replicated data
    Ziwich, RP
    Duarte, EP
    Albini, LCP
    11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL I, PROCEEDINGS, 2005, : 363 - 369
  • [30] INTEGRITY CHECKING IN DATA-BASE SYSTEMS
    WEBER, W
    STUCKY, W
    KARSZT, J
    INFORMATION SYSTEMS, 1983, 8 (02) : 125 - 136