Secure Untrusted Data Repository (SUNDR)

نویسندگان

  • Jinyuan Li
  • Maxwell N. Krohn
  • David Mazières
  • Dennis Shasha
چکیده

We have implemented a secure network file system called SUNDR that guarantees the integrity of data even when malicious parties control the server. SUNDR splits storage functionality between two untrusted components, a block store and a consistency server. The block store holds all file data and most metadata. Without interpreting metadata, it presents a simple interface for clients to store variable-sized data blocks and later retrieve them by cryptographic hash. The consistency server implements a novel protocol that guarantees close-to-open consistency whenever users see each other’s updates. The protocol roughly consists of users exchanging version-stamped digital signatures of block server metadata, though a number of subtleties arise in efficiently supporting concurrent clients and groupwritable files. We have proven the protocol’s security under basic cryptographic assumptions. Without somehow producing signed messages valid under a user’s (or the superuser’s) public key, an attacker cannot tamper with a user’s files—even given control of the servers and network. Despite this guarantee, SUNDR performs within a reasonable factor of existing insecure network file systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Building secure file systems out of Byzantine storage

This paper shows how to implement a trusted network file system on an untrusted server. While cryptographic storage techniques exist that allow users to keep data secret from untrusted servers, this work concentrates on the detection of tampering attacks and stale data. Ideally, users of an untrusted storage server would immediately and unconditionally notice any misbehavior on the part of the ...

متن کامل

Education Teaching Experience Work Experience Journal Publications Refereed Conference Publications Refereed Workshop Publications Professional Service Academic Software Projects

ions. In Proceedings of the 21st Symposium on Operating Systems Principles (SOSP), Stevenson, WA, October 2007. [6] M. Krohn, A. Yip, M. Brodsky, R. Morris, and M. Walfish. A World Wide Web Without Walls. In Proceedings of the 6th ACM Workshop on Hot Topics in Networks (HotNets), Atlanta, GA, November 2007. [7] J. Li, M. Krohn, D. Mazières, and D. Shasha. Secure untrusted data repository (SUNDR...

متن کامل

Don't Trust your File Server

All too often, decisions about whom to trust in computer systems are driven by the needs of system management rather than data security. In particular, data storage is often entrusted to people who have no role in creating or using the data—through outsourcing of data management, hiring of outside consultants to administer servers, or even collocation servers in physically insecure machine room...

متن کامل

Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...

متن کامل

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004