Title Consideration of Experimental Evaluationabout Encrypted Replica Update Process

نویسندگان

  • Kazuki Takayama
  • Dai Kobayashi
  • Haruo Yokota
چکیده

The secure storage systems adopting the encrypt-on-disk scheme, in which files are stored in cipher for efficient data transmission, need to re-encrypt files with new cryptographic keys when a revocation occurs. There are two re-encryption methods, namely active revocation in which the re-encryption is immediately performed and lazy revocation in which the re-encryption is delayed until the file is updated. There is the trade-off between performance and security because active revocation has the expense of immediate re-encryption, while lazy revocation is vulnerable during its re-encryption delay. We consider the environment in which re-encrypted file is pre-computed by using backup data in a parallel storage system effective for this issue. However, the performance of update is decreased on account of the difference of keys used in primary and backup. In this paper, we evaluate a method in which the differential data re-encrypted for backup are not written to the file but be kept on the memory in different key environment, and evaluate the different key environment in parallel storage by experiment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient update propagation algorithm for P2P systems

As more and more applications with dynamic files are introduced in peer-to-peer (P2P) systems, file consistency maintenance becomes important. In this paper, we propose a novel file consistency maintenance algorithm, called Update P ropagation Through Replica Chain (UPTReC), for decentralized and unstructured peer-to-peer (P2P) systems. UPTReC provides a probabilistically guaranteed file consis...

متن کامل

Dynamic Multi-keyword Top-k Ranked Search over Encrypted Cloud Data

Nowadays, more and more people are motivated to outsource their local data to public cloud servers for great convenience and reduced costs in data management. But in consideration of privacy issues, sensitive data should be encrypted before outsourcing, which obsoletes traditional data utilization like keyword-based document retrieval. In this paper, we present a secure and efficient multi-keyw...

متن کامل

Improving Data Availability Using Combined Replication Strategy in Cloud Environment

As grow as the data-intensive applications in cloud computing day after day, data popularity in this environment becomes critical and important. Hence to improve data availability and efficient accesses to popular data, replication algorithms are now widely used in distributed systems. However, most of them only replicate the static number of replicas on some requested chosen sites and it is ob...

متن کامل

Scalable Transactions in Partially Replicated Data Systems with Causal Snapshot Isolation

We present here a transaction management protocol, which enhances the Partitioned Causal Snapshot Isolation (PCSI) protocol, to support scalable transactions with non-local partition writes in a partially replicated multi-version database. The PCSI protocol is scalable for update transactions that involve local read and writes. However, it faces scalability limitations with non-local partition ...

متن کامل

Timed buffers: A technique for update propagation in nomadic environments

Optimistic replication algorithms allow data presented to users to be stale (non-up-to-date) but in a controlled way: they propagate updates in background and allow any replica to be accessed directly most of the time. When the timely propagation of updates to remote distributed replicas is an important issue, it is preferable that a replica gets the same update twice than it does not receive i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017