Integrity checking in cryptographic file systems with constant trusted storage

被引:0
|
作者
Oprea, Alina [1 ]
Reiter, Michael K. [1 ,2 ]
机构
[1] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
[2] Carnegie Mellon Univ, Elect & Comp Engn Dept, Pittsburgh, PA 15213 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose two new constructions for protecting the integrity of files in cryptographic file systems. Our constructions are designed to exploit two characteristics of many file-system workloads, namely low entropy of file contents and high sequentiality of file block writes. At the same time, our approaches maintain the best features of the most commonly used algorithm today (Merkle trees), including defense against replay of stale (previously overwritten) blocks and a small, constant amount of trusted storage per file. Via implementations in the EncFS cryptographic file system, we evaluate the performance and storage requirements of our new constructions compared to those of Merkle trees. We conclude with guidelines for choosing the best integrity algorithm depending on typical application workload.
引用
收藏
页码:183 / +
页数:3
相关论文
共 50 条
  • [31] Comment of Secure File Storage and Retrieval in Cloud Based on MRSA Cryptographic Algorithm
    Zhong, Zhengrun
    Liu, Hongxuan
    Chen, Sonia C-, I
    Liu, Chenglian
    Gardner, Donald
    2020 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY AND MANAGEMENT (ICITM 2020), 2020, : 261 - 264
  • [32] A Time and Storage Efficient Solution to Remote File Integrity Check
    Sarad, A., V
    Sankar, K.
    Vipin, M.
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 120 - 125
  • [33] Making Cloud Storage Integrity Checking Protocols Economically Smarter
    Chen, Fei
    Xiong, Xinyu
    Zhang, Taoyi
    Li, Jianqiang
    Chen, Jianyong
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 297 - 306
  • [34] A Remote Data Integrity Checking Scheme for Big Data Storage
    Chen, Xingyue
    Shang, Tao
    Kim, Ilryong
    Liu, Jianwei
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 53 - 59
  • [35] An improved public auditing protocol for cloud storage integrity checking
    Zhang, Jindan
    Wang, Baocang
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2019, 15 (03) : 282 - 303
  • [36] Efficient Continuous Big Data Integrity Checking for Decentralized Storage
    Yu, Haiyang
    Hu, Qi
    Yang, Zhen
    Liu, Huan
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 1658 - 1673
  • [37] Integrity checking using third party auditor in cloud storage
    Chakraborty, Sutirtha
    Singh, Shubham
    Thokchom, Surmila
    2018 ELEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2018, : 75 - 80
  • [38] Attribute-based Data Integrity Checking for Cloud Storage
    Tian, Miaomiao
    Wang, Lingyan
    Zhong, Hong
    Chen, Jie
    FUNDAMENTA INFORMATICAE, 2018, 163 (04) : 395 - 411
  • [39] TRIBOLOGY OF FILE STORAGE-SYSTEMS
    MIYAKE, S
    JOURNAL OF JAPANESE SOCIETY OF TRIBOLOGISTS, 1995, 40 (01) : 27 - 29
  • [40] Key derivation algorithms for monotone access structures in cryptographic file systems
    Srivatsa, Mudhakar
    Liu, Ling
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 347 - +