Show simple item record

dc.contributor.authorYang, Hsin-Jung
dc.contributor.authorZeldovich, Nickolai
dc.contributor.authorDevadas, Srinivas
dc.contributor.authorCostan, Victor Marius
dc.date.accessioned2014-04-14T17:56:32Z
dc.date.available2014-04-14T17:56:32Z
dc.date.issued2013-11
dc.identifier.isbn9781450324908
dc.identifier.urihttp://hdl.handle.net/1721.1/86161
dc.description.abstractA major security concern with outsourcing data storage to third-party providers is authenticating the integrity and freshness of data. State-of-the-art software-based approaches require clients to maintain state and cannot immediately detect forking attacks, while approaches that introduce limited trusted hardware (e.g., a monotonic counter) at the storage server achieve low throughput. This paper proposes a new design for authenticating data storage using a small piece of high-performance trusted hardware attached to an untrusted server. The proposed design achieves significantly higher throughput than previous designs. The server-side trusted hardware allows clients to authenticate data integrity and freshness without keeping any mutable client-side state. Our design achieves high performance by parallelizing server-side authentication operations and permitting the untrusted server to maintain caches and schedule disk writes, while enforcing precise crash recovery and write access control.en_US
dc.language.isoen_US
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1145/2517488.2517494en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT web domainen_US
dc.titleAuthenticated storage using small trusted hardwareen_US
dc.typeArticleen_US
dc.identifier.citationHsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas. 2013. Authenticated storage using small trusted hardware. In Proceedings of the 2013 ACM workshop on Cloud computing security workshop (CCSW '13). ACM, New York, NY, USA, 35-46.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorYang, Hsin-Jungen_US
dc.contributor.mitauthorCostan, Victor Mariusen_US
dc.contributor.mitauthorZeldovich, Nickolaien_US
dc.contributor.mitauthorDevadas, Srinivasen_US
dc.relation.journalProceedings of the 2013 ACM workshop on Cloud computing security workshop (CCSW '13)en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsYang, Hsin-Jung; Costan, Victor; Zeldovich, Nickolai; Devadas, Srinivasen_US
dc.identifier.orcidhttps://orcid.org/0000-0001-8253-7714
dc.identifier.orcidhttps://orcid.org/0000-0002-0990-7763
dc.identifier.orcidhttps://orcid.org/0000-0003-0238-2703
dc.identifier.orcidhttps://orcid.org/0000-0002-7770-1273
dspace.mitauthor.errortrue
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record