Log-Structure Authenticated Data Storage with Minimal Trust

نویسندگان

  • Yuzhe Tang
  • Ju Chen
چکیده

Today, data outsourcing to the clouds is a popular computing paradigm, and enabling efficient and trustworthy outsourcing becomes critically important as many emerging cloud applications are increasingly security-sensitive, such as healthcare, finance, etc. One of the promising techniques is authentication data structure (ADS). Most existing ADSs are not log-structured, yet cloud storage systems that work beneath the ADSs are log-structured – this structural mismatch leads to significant performance overhead. We propose log-structured ADSs for lightweight verification in cloud outsourcing. Our approach is leveraging recently available commercial TEE (trusted execution environment, such as Intel SGX). For security, only two functionalities are placed inside a TEE, that is, frontend consistency checking and backend maintenance computations, yielding a small TCB (trusted codebase). For performance efficiency, the ADS layer follows the log-structured design, resulting in small overhead. We implemented a working log-structured ADS system on LevelDB, and demonstrated a small TCB and small performance overhead (6 ∼ 12% in IOintensive workloads) through extensive performance studies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Super-efficient Aggregating History-independent PADs

Authenticated dictionaries allow users to send lookup requests to an untrusted server and get authenticated answers. Persistent authenticated dictionaries (PADs) add queries against historical versions. We consider a variety of different trust models for PADs and we present several extensions, including support for aggregation and a rich query language, as well as hiding information about the o...

متن کامل

An Efficient and Scalable Authenticated Cloud Storage Scheme Based on Trapdoor Hash Functions

Storage services are among the primary cloud computing offerings, providing advantages of scale, cost and availability to its customers. However, studies and past experiences show that large-scale storage service can be unreliable, and vulnerable to various threats that cause loss and/or corruption of customer data. Since cloud service providers have an incentive to hide these corruptions/losse...

متن کامل

An Efficient Feedback-based Trust Model for Pervasive Computing

In pervasive computing environments, pervasive devices should collaborate effectively such that the vision of pervasive computing will come true. However, without trust, pervasive devices cannot collaborate effectively. Distributed trust systems (DTS) may support trust and thus foster collaboration in hostile pervasive computing environments. The challenge for DTS is how to aggregate the local ...

متن کامل

DEFY: A Deniable, Encrypted File System for Log-Structured Storage

While solutions for file system encryption can prevent an adversary from determining the contents of files, in situations where a user wishes to hide the existence of data, encryption alone is not sufficient. Indeed, encryption may draw attention to those files, as they may likely contain information the user wishes to keep secret. Consequently, adversarial coercion may motivate the owner to su...

متن کامل

Optimal and Parallel Online Memory Checking

Memory checking studies the problem of cryptographically verifying the correctness of untrusted indexed storage. After a series of results yielding checkers with O(log n) query complexity, Dwork, Naor, Ruthblum and Vaikuntanathan [9] derived an Ω(log n/ log logn) lower bound on the query complexity of any checker operating on memory words of polylogarithmic size, where n is the number of memory...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017