PACE: Proactively-Secure Accumulo with Cryptographic Enforcement

نویسندگان

  • Scott Ruoti
  • Ariel Hamlin
  • Emily Shen
  • Cassandra Sparks
  • Robert Cunningham
چکیده

Cloud-hosted databases have many compelling benefits, including high availability, flexible resource allocation, and resiliency to attack, but it requires that cloud tenants cede control of their data to the cloud provider. In this paper, we describe Proactively-secure Accumulo with Cryptographic Enforcement (PACE), a client-side library that cryptographically protects a tenant’s data, returning control of that data to the tenant. PACE is a drop-in replacement for Accumulo’s APIs and works with Accumulo’s row-level security model. We evaluate the performance of PACE, discussing the impact of encryption and signatures on operation throughput.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

TLS, PACE, and EAC: ACryptographic View at Modern Key Exchange Protocols

To establish a secure channel between two parties common security solutions often use a key exchange protocol as a preliminary subroutine to generate a shared key. These solutions include the protocols for secure communication between a reader and an identity card or passport, called PACE and EAC, and the TLS protocol for secure web communication. In this work we survey the cryptographic status...

متن کامل

A Cryptographic Key Assignment Scheme with Adaptable Time- token Constraint in a Hierarchy

A scheme, which uses flexible cryptographic key management upon adaptable time-token constraint for a user hierarchy access control (UHAC) scheme, is proposed in this paper. For adapting the changeability in a UHAC system, we propose a technique of assigning independent time-token which is distributed by a trusted agency server to reply an authorized user for once secure access request. The key...

متن کامل

طراحی سیستم مخابراتی امن با استفاده از سنکرونکردن سیستمهای آشوبی

In this paper, the concept of secure synchronization of chaotic systems using adaptive and robust techniques , has been discussed and then a new secure communication scheme, based on secure synchronization of a general class of chaotic systems called Generalized Lorenz System, are presented. This communication scheme is combination of conventional cryptographic methods and chaotic modulation me...

متن کامل

Managing Contracts in Pleiades Using Trust Management

The advent of multicore technologies is set to significantly increase the average compute power per machine. Effective and efficient exploitation of this power poses unprecedented challenges and opportunities. The Pleiades system, currently under development in UCF, CSU and UCC [1], proposes the construction of a distributed, heterogeneous, and secure marketplace for trading and administer thes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017