dc.contributor.author | Yang, Hsin-Jung | |
dc.contributor.author | Zeldovich, Nickolai | |
dc.contributor.author | Devadas, Srinivas | |
dc.contributor.author | Costan, Victor Marius | |
dc.date.accessioned | 2014-04-14T17:56:32Z | |
dc.date.available | 2014-04-14T17:56:32Z | |
dc.date.issued | 2013-11 | |
dc.identifier.isbn | 9781450324908 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/86161 | |
dc.description.abstract | A major security concern with outsourcing data storage to third-party providers is authenticating the integrity and freshness of data. State-of-the-art software-based approaches require clients to maintain state and cannot immediately detect forking attacks, while approaches that introduce limited trusted hardware (e.g., a monotonic counter) at the storage server achieve low throughput. This paper proposes a new design for authenticating data storage using a small piece of high-performance trusted hardware attached to an untrusted server. The proposed design achieves significantly higher throughput than previous designs. The server-side trusted hardware allows clients to authenticate data integrity and freshness without keeping any mutable client-side state. Our design achieves high performance by parallelizing server-side authentication operations and permitting the untrusted server to maintain caches and schedule disk writes, while enforcing precise crash recovery and write access control. | en_US |
dc.language.iso | en_US | |
dc.publisher | Association for Computing Machinery (ACM) | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1145/2517488.2517494 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | en_US |
dc.source | MIT web domain | en_US |
dc.title | Authenticated storage using small trusted hardware | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas. 2013. Authenticated storage using small trusted hardware. In Proceedings of the 2013 ACM workshop on Cloud computing security workshop (CCSW '13). ACM, New York, NY, USA, 35-46. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.mitauthor | Yang, Hsin-Jung | en_US |
dc.contributor.mitauthor | Costan, Victor Marius | en_US |
dc.contributor.mitauthor | Zeldovich, Nickolai | en_US |
dc.contributor.mitauthor | Devadas, Srinivas | en_US |
dc.relation.journal | Proceedings of the 2013 ACM workshop on Cloud computing security workshop (CCSW '13) | en_US |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
dspace.orderedauthors | Yang, Hsin-Jung; Costan, Victor; Zeldovich, Nickolai; Devadas, Srinivas | en_US |
dc.identifier.orcid | https://orcid.org/0000-0001-8253-7714 | |
dc.identifier.orcid | https://orcid.org/0000-0002-0990-7763 | |
dc.identifier.orcid | https://orcid.org/0000-0003-0238-2703 | |
dc.identifier.orcid | https://orcid.org/0000-0002-7770-1273 | |
dspace.mitauthor.error | true | |
mit.license | OPEN_ACCESS_POLICY | en_US |
mit.metadata.status | Complete | |