A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Verifying the Consistency of Remote Untrusted Services with Commutative Operations
[chapter]
2014
Lecture Notes in Computer Science
The clients do not communicate with each other and would like to verify the correctness of the remote computation and the consistency of the server's responses. ...
A group of mutually trusting clients outsources a computation service to a remote server, which they do not fully trust and that may be subject to attacks. ...
This work has been supported in part by the European Union's Seventh Framework Programme (FP7/2007-2013) under grant agreement number ICT-257243 TCLOUDS. ...
doi:10.1007/978-3-319-14472-6_1
fatcat:ww5r322d5re7xiseosyd7pekla
Ensuring Dynamic Data Integrity based on Variable Block-size BLS in Untrusted Environment
2013
International Journal of Digital Content Technology and its Applications
The computation complexity of dynamic data operation and integrity verifying reaches O(log n) definitely. ...
One major challenge is to ensure the integrity of data in untrusted environment under the condition of supporting public auditability and dynamic data operation. ...
VerifyUser: With our untrusted security model, the user may be malicious, it is probably that the parameters which user given are wrong or the contents of the file F are not consistent with signatures, ...
doi:10.4156/jdcta.vol7.issue5.98
fatcat:rhd7n3f2nbc6xb6pybrkifryx4
Don't Trust the Cloud, Verify
2017
ACM Transactions on Privacy and Security
Hence, with only one check they can verify a large number of past operations. ...
This contradicts the goal of outsourcing data to the cloud. BST and COP [8] circumvent blocking for all operations that commute with each other. ...
This work shows how to protect data integrity and consistency for an untrusted cloud storage service accessed by multiple clients. ...
doi:10.1145/3079762
fatcat:2pdvtyncejg4ngclr5c4rnfkg4
Don't trust the cloud, verify
2015
Proceedings of the 8th ACM International Systems and Storage Conference on - SYSTOR '15
Hence, with only one check they can verify a large number of past operations. ...
This contradicts the goal of outsourcing data to the cloud. BST and COP [8] circumvent blocking for all operations that commute with each other. ...
This work shows how to protect data integrity and consistency for an untrusted cloud storage service accessed by multiple clients. ...
doi:10.1145/2757667.2757681
dblp:conf/systor/BrandenburgerCK15
fatcat:pofsdcmpibbzxmxpdppaqyzjhq
Don't Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores
[article]
2016
arXiv
pre-print
VICOS enforces the consistency notion of fork-linearizability, supports wait-free client semantics for most operations, and reduces the computation and communication overhead compared to previous protocols ...
A prototype of VICOS that works with the key-value store interface of commodity cloud storage services has been implemented, and an evaluation demonstrates its advantage compared to existing systems. ...
Acknowledgments We thank Rüdiger Kapitza, Dieter Sommer and Sören Bleikertz for helpful discussions and the anonymous reviewers of SYSTOR 2015 for valuable comments. ...
arXiv:1502.04496v2
fatcat:eqmsapd5ynakhfjejmu7y45tle
Ironclad Apps: End-to-End Security via Automated Full-System Verification
2014
USENIX Symposium on Operating Systems Design and Implementation
An Ironclad App lets a user securely transmit her data to a remote machine with the guarantee that every instruction executed on that machine adheres to a formal abstract specification of the app's behavior ...
We then use cryptography and secure hardware to enable secure channels from the verified software to remote users. ...
We are especially grateful to our shepherd Gernot Heiser, whose insightful feedback improved the paper. ...
dblp:conf/osdi/HawblitzelHLNPZZ14
fatcat:dx5wimwh4ffavkwpb5cssr54lm
Efficient integrity checking of untrusted network storage
2008
Proceedings of the 4th ACM international workshop on Storage security and survivability - StorageSS '08
This paper presents a general method and a practical prototype application for verifying the integrity of files in an untrusted network storage service. ...
The proposed integrity verification service can work with any storage service since it is transparent to the storage technology used. ...
Ministry of Research under grant number RBIP06BZW8, project FIRB "Advanced tracking system in intermodal freight transportation". ...
doi:10.1145/1456469.1456479
dblp:conf/storagess/HeitzmannPPT08
fatcat:ddsvkyksdzc57mjdq2abzwq7za
SPORC: Group Collaboration using Untrusted Cloud Resources
2010
USENIX Symposium on Operating Systems Design and Implementation
Conceptually, SPORC illustrates the complementary benefits of operational transformation (OT) and fork* consistency. ...
To overcome this strict tradeoff, we present SPORC, a generic framework for building a wide variety of collaborative applications with untrusted servers. ...
We also thank our shepherd, Lidong Zhou, and the anonymous reviewers for their helpful comments. This research was supported by funding from Google and the NSF CAREER grant CNS-0953197. ...
dblp:conf/osdi/FeldmanZFF10
fatcat:dva3vjaf5jdivnhfiqnmdozpma
Concise Survey on Privacy Preserving Techniques in Cloud
IARJSET - Science, Engineering and Technology
2015
IARJSET
IARJSET - Science, Engineering and Technology
Public key cryptosystem, the MD5 Message-Digest Algorithm are depicted. Proof-Of-Retrievability system for public verifiability is described. ...
LT codes based cloud storage service (LTCS) to empower efficient decoding, Merkle Hash Tree (MHT) for the block tag Authentication is discussed. ...
A 64-bit representation is made with B and the result is added with the previous step. The algorithm consists of four word buffer to compute the message digest. ...
doi:10.17148/iarjset.2015.2206
fatcat:hk7ocm7hu5cqfdw6bbvmsrdhtq
Security, Privacy and Trust: Cognitive Internet of Vehicles
[article]
2021
arXiv
pre-print
The recent advancement of cloud technology offers unparallel strength to support intelligent computations and advanced services to assist with automated decisions to improve road transportation safety ...
The redefined cognitive technology in this framework promises significant enhancements and optimized network capacities compared with its predecessor framework, the Internet of Vehicles (IoV). ...
The strategic services are enabled through different operations and analysis tools. ...
arXiv:2104.12878v1
fatcat:q2b2nkjoajgurk7fgs2m5binvq
polyLarva: Runtime Verification with Configurable Resource-Aware Monitoring Boundaries
[chapter]
2012
Lecture Notes in Computer Science
This limits the use of system resources with resource intensive verification being carried out on the remote-side. ...
of high volume transaction throughputs and cannot afford substantial deterioration in the service they provide. ...
The remote-side consisted of a separate machine having an Intel(R) Core(TM)2 Duo CPU T6400, 2GB RAM with Microsoft Windows 7 operating system. ...
doi:10.1007/978-3-642-33826-7_15
fatcat:ozhniyloxbf7rogjwxrtwjicqy
Data Security and Privacy in Cloud Computing
2014
International Journal of Distributed Sensor Networks
Data security has consistently been a major issue in information technology. ...
Data security and privacy protection are the two main factors of user's concerns about the cloud technology. ...
Verifying the integrity of data in the cloud remotely is the perquisite to deploy applications. ...
doi:10.1155/2014/190903
fatcat:hewip3lmuvbf3kp6ue4lbhuply
Proving the correct execution of concurrent services in zero-knowledge
2018
USENIX Symposium on Operating Systems Design and Implementation
Such proofs are succinct (a verifier can check them efficiently without reexecution) and zeroknowledge (a verifier learns nothing about the content of the requests, responses, or the internal state of ...
the service). ...
improved the content and presentation of this work. ...
dblp:conf/osdi/SettyAGL18
fatcat:dezrfbvbxzaxxkfwlzqm2akmha
An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
2013
2013 2nd International Conference on Advanced Computing, Networking and Security
Currently, there has been an increasing trend in outsourcing data to remote cloud, where the people outsource their data at Cloud Service Provider(CSP) who offers huge storage space with low cost. ...
Hence, efficient and effective methods are needed to ensure the data integrity and confidentiality of outsource data on untrusted cloud servers. ...
The First author also would like to thank HRD ministry of India for providing the UGC-RGNF Fellowship. ...
doi:10.1109/adcons.2013.46
dblp:conf/adcons/KumarSS13
fatcat:orf4ro43yra2hbxdxef6x4aln4
Software abstractions for trusted sensors
2012
Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys '12
With the proliferation of e-commerce, e-wallet, and e-health smartphone applications, the need for trusted mobile applications is greater than ever. ...
We present the design and implementation of these abstractions on both x86 and ARM platforms. ...
To validate its authenticity, a verifier requests a remote attestation from the platform, using a standard remote attestation verification protocol. ...
doi:10.1145/2307636.2307670
dblp:conf/mobisys/LiuSWR12
fatcat:u6avq3qfezgn5aihcwghiekfcm
« Previous
Showing results 1 — 15 out of 322 results