322 Hits in 3.9 sec

Verifying the Consistency of Remote Untrusted Services with Commutative Operations [chapter]

Christian Cachin, Olga Ohrimenko
2014 Lecture Notes in Computer Science  
The clients do not communicate with each other and would like to verify the correctness of the remote computation and the consistency of the server's responses.  ...  A group of mutually trusting clients outsources a computation service to a remote server, which they do not fully trust and that may be subject to attacks.  ...  This work has been supported in part by the European Union's Seventh Framework Programme (FP7/2007-2013) under grant agreement number ICT-257243 TCLOUDS.  ... 
doi:10.1007/978-3-319-14472-6_1 fatcat:ww5r322d5re7xiseosyd7pekla

Ensuring Dynamic Data Integrity based on Variable Block-size BLS in Untrusted Environment

Long Chen, Wei Song, Siuming Yiu, Wenjun Luo
2013 International Journal of Digital Content Technology and its Applications  
The computation complexity of dynamic data operation and integrity verifying reaches O(log n) definitely.  ...  One major challenge is to ensure the integrity of data in untrusted environment under the condition of supporting public auditability and dynamic data operation.  ...  VerifyUser: With our untrusted security model, the user may be malicious, it is probably that the parameters which user given are wrong or the contents of the file F are not consistent with signatures,  ... 
doi:10.4156/jdcta.vol7.issue5.98 fatcat:rhd7n3f2nbc6xb6pybrkifryx4

Don't Trust the Cloud, Verify

Marcus Brandenburger, Christian Cachin, Nikola Knežević
2017 ACM Transactions on Privacy and Security  
Hence, with only one check they can verify a large number of past operations.  ...  This contradicts the goal of outsourcing data to the cloud. BST and COP [8] circumvent blocking for all operations that commute with each other.  ...  This work shows how to protect data integrity and consistency for an untrusted cloud storage service accessed by multiple clients.  ... 
doi:10.1145/3079762 fatcat:2pdvtyncejg4ngclr5c4rnfkg4

Don't trust the cloud, verify

Marcus Brandenburger, Christian Cachin, Nikola Knežević
2015 Proceedings of the 8th ACM International Systems and Storage Conference on - SYSTOR '15  
Hence, with only one check they can verify a large number of past operations.  ...  This contradicts the goal of outsourcing data to the cloud. BST and COP [8] circumvent blocking for all operations that commute with each other.  ...  This work shows how to protect data integrity and consistency for an untrusted cloud storage service accessed by multiple clients.  ... 
doi:10.1145/2757667.2757681 dblp:conf/systor/BrandenburgerCK15 fatcat:pofsdcmpibbzxmxpdppaqyzjhq

Don't Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores [article]

Marcus Brandenburger, Christian Cachin, Nikola Knežević
2016 arXiv   pre-print
VICOS enforces the consistency notion of fork-linearizability, supports wait-free client semantics for most operations, and reduces the computation and communication overhead compared to previous protocols  ...  A prototype of VICOS that works with the key-value store interface of commodity cloud storage services has been implemented, and an evaluation demonstrates its advantage compared to existing systems.  ...  Acknowledgments We thank Rüdiger Kapitza, Dieter Sommer and Sören Bleikertz for helpful discussions and the anonymous reviewers of SYSTOR 2015 for valuable comments.  ... 
arXiv:1502.04496v2 fatcat:eqmsapd5ynakhfjejmu7y45tle

Ironclad Apps: End-to-End Security via Automated Full-System Verification

Chris Hawblitzel, Jon Howell, Jacob R. Lorch, Arjun Narayan, Bryan Parno, Danfeng Zhang, Brian Zill
2014 USENIX Symposium on Operating Systems Design and Implementation  
An Ironclad App lets a user securely transmit her data to a remote machine with the guarantee that every instruction executed on that machine adheres to a formal abstract specification of the app's behavior  ...  We then use cryptography and secure hardware to enable secure channels from the verified software to remote users.  ...  We are especially grateful to our shepherd Gernot Heiser, whose insightful feedback improved the paper.  ... 
dblp:conf/osdi/HawblitzelHLNPZZ14 fatcat:dx5wimwh4ffavkwpb5cssr54lm

Efficient integrity checking of untrusted network storage

Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia
2008 Proceedings of the 4th ACM international workshop on Storage security and survivability - StorageSS '08  
This paper presents a general method and a practical prototype application for verifying the integrity of files in an untrusted network storage service.  ...  The proposed integrity verification service can work with any storage service since it is transparent to the storage technology used.  ...  Ministry of Research under grant number RBIP06BZW8, project FIRB "Advanced tracking system in intermodal freight transportation".  ... 
doi:10.1145/1456469.1456479 dblp:conf/storagess/HeitzmannPPT08 fatcat:ddsvkyksdzc57mjdq2abzwq7za

SPORC: Group Collaboration using Untrusted Cloud Resources

Ariel J. Feldman, William P. Zeller, Michael J. Freedman, Edward W. Felten
2010 USENIX Symposium on Operating Systems Design and Implementation  
Conceptually, SPORC illustrates the complementary benefits of operational transformation (OT) and fork* consistency.  ...  To overcome this strict tradeoff, we present SPORC, a generic framework for building a wide variety of collaborative applications with untrusted servers.  ...  We also thank our shepherd, Lidong Zhou, and the anonymous reviewers for their helpful comments. This research was supported by funding from Google and the NSF CAREER grant CNS-0953197.  ... 
dblp:conf/osdi/FeldmanZFF10 fatcat:dva3vjaf5jdivnhfiqnmdozpma

Concise Survey on Privacy Preserving Techniques in Cloud
IARJSET - Science, Engineering and Technology

B.Banu priya, V. Sobhana, Mishmala Sushith
2015 IARJSET  
Public key cryptosystem, the MD5 Message-Digest Algorithm are depicted. Proof-Of-Retrievability system for public verifiability is described.  ...  LT codes based cloud storage service (LTCS) to empower efficient decoding, Merkle Hash Tree (MHT) for the block tag Authentication is discussed.  ...  A 64-bit representation is made with B and the result is added with the previous step. The algorithm consists of four word buffer to compute the message digest.  ... 
doi:10.17148/iarjset.2015.2206 fatcat:hk7ocm7hu5cqfdw6bbvmsrdhtq

Security, Privacy and Trust: Cognitive Internet of Vehicles [article]

Khondokar Fida Hasan, Anthony Overall, Keyvan Ansari, Gowri Ramachandran, Raja Jurdak
2021 arXiv   pre-print
The recent advancement of cloud technology offers unparallel strength to support intelligent computations and advanced services to assist with automated decisions to improve road transportation safety  ...  The redefined cognitive technology in this framework promises significant enhancements and optimized network capacities compared with its predecessor framework, the Internet of Vehicles (IoV).  ...  The strategic services are enabled through different operations and analysis tools.  ... 
arXiv:2104.12878v1 fatcat:q2b2nkjoajgurk7fgs2m5binvq

polyLarva: Runtime Verification with Configurable Resource-Aware Monitoring Boundaries [chapter]

Christian Colombo, Adrian Francalanza, Ruth Mizzi, Gordon J. Pace
2012 Lecture Notes in Computer Science  
This limits the use of system resources with resource intensive verification being carried out on the remote-side.  ...  of high volume transaction throughputs and cannot afford substantial deterioration in the service they provide.  ...  The remote-side consisted of a separate machine having an Intel(R) Core(TM)2 Duo CPU T6400, 2GB RAM with Microsoft Windows 7 operating system.  ... 
doi:10.1007/978-3-642-33826-7_15 fatcat:ozhniyloxbf7rogjwxrtwjicqy

Data Security and Privacy in Cloud Computing

Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu
2014 International Journal of Distributed Sensor Networks  
Data security has consistently been a major issue in information technology.  ...  Data security and privacy protection are the two main factors of user's concerns about the cloud technology.  ...  Verifying the integrity of data in the cloud remotely is the perquisite to deploy applications.  ... 
doi:10.1155/2014/190903 fatcat:hewip3lmuvbf3kp6ue4lbhuply

Proving the correct execution of concurrent services in zero-knowledge

Srinath T. V. Setty, Sebastian Angel, Trinabh Gupta, Jonathan Lee
2018 USENIX Symposium on Operating Systems Design and Implementation  
Such proofs are succinct (a verifier can check them efficiently without reexecution) and zeroknowledge (a verifier learns nothing about the content of the requests, responses, or the internal state of  ...  the service).  ...  improved the content and presentation of this work.  ... 
dblp:conf/osdi/SettyAGL18 fatcat:dezrfbvbxzaxxkfwlzqm2akmha

An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing

P. Syam Kumar, R. Subramanian, D. Thamizh Selvam
2013 2013 2nd International Conference on Advanced Computing, Networking and Security  
Currently, there has been an increasing trend in outsourcing data to remote cloud, where the people outsource their data at Cloud Service Provider(CSP) who offers huge storage space with low cost.  ...  Hence, efficient and effective methods are needed to ensure the data integrity and confidentiality of outsource data on untrusted cloud servers.  ...  The First author also would like to thank HRD ministry of India for providing the UGC-RGNF Fellowship.  ... 
doi:10.1109/adcons.2013.46 dblp:conf/adcons/KumarSS13 fatcat:orf4ro43yra2hbxdxef6x4aln4

Software abstractions for trusted sensors

He Liu, Stefan Saroiu, Alec Wolman, Himanshu Raj
2012 Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys '12  
With the proliferation of e-commerce, e-wallet, and e-health smartphone applications, the need for trusted mobile applications is greater than ever.  ...  We present the design and implementation of these abstractions on both x86 and ARM platforms.  ...  To validate its authenticity, a verifier requests a remote attestation from the platform, using a standard remote attestation verification protocol.  ... 
doi:10.1145/2307636.2307670 dblp:conf/mobisys/LiuSWR12 fatcat:u6avq3qfezgn5aihcwghiekfcm
« Previous Showing results 1 — 15 out of 322 results