On Consistency of Encrypted Files
|
|
|
- Veronica O’Connor’
- 10 years ago
- Views:
Transcription
1 On Consistency of Encrypted Files Alina Oprea Michael K. Reiter March 2005 CMU-CS School of Computer Science Carnegie Mellon University Pittsburgh, PA Computer Science Department, Carnegie Mellon University, Pittsburgh, PA, USA; Electrical and Computer Engineering Department and Computer Science Department, Carnegie Mellon University, Pittsburgh, PA, USA;
2 Keywords: cryptographic file systems, shared objects, consistency models, linearizability, fork consistency.
3 Abstract In this paper we address the problem of consistency for cryptographic file systems. A cryptographic file system protects the users data from the file server, which is possibly untrusted and might exhibit Byzantine behavior, by encrypting the data before sending it to the server. The consistency of the encrypted file objects that implement a cryptographic file system relies on the consistency of the two components used to implement them: the file storage protocol and the key distribution protocol. We first formally define consistency for encrypted file objects in a generic way: for any consistency conditions for the key and file objects belonging to one of the two classes of consistency conditions considered, we define a corresponding consistency condition for encrypted file objects. We then provide, in our main result, necessary and sufficient conditions for the consistency of the key distribution and file storage protocols under which the encrypted storage is consistent. Lastly, we give an example implementation of a consistent encrypted file object, utilizing a fork consistent file access protocol and a sequentially consistent key distribution protocol. The proof of consistency of the implementation builds from our main theorem.
4
5 1 Introduction Consistency for a file system that supports data sharing specifies the semantics of multiple users accessing files simultaneously. Intuitively, the ideal model of consistency would respect the realtime ordering of file operations, i.e., a read would return the last written version of that file. This intuition is captured in the model of consistency known as linearizability [17], though in practice, such ideal consistency models can have high performance penalties. It is well known that there is a tradeoff between performance and consistency. As such, numerous consistency conditions weaker than linearizability, and that can be implemented more efficiently in various contexts, have been explored. Sequential consistency [20], causal consistency [3], PRAM consistency [23] and more recently, fork consistency [25], are several examples. In this paper we address the problem of consistency for encrypted file objects used to implement a cryptographic file system. A cryptographic file system protects the users data from the file server, which is possibly untrusted and might exhibit Byzantine behavior, by encrypting the data before sending it to the server. When a file can be shared, the decryption key must be made available to authorized readers, and similarly authorized writers of the file must be able to retrieve the encryption key or else create one of their own. In this sense, a key is an object that, like a file, is read and/or written in the course of implementing the abstraction of an encrypted file. Thus, an encrypted file object is implemented through two main components: the key object that stores the encryption key, and the file object that stores (encrypted) file contents. We emphasize that the key and file objects may be implemented via completely different protocols and infrastructures. Our concern is the impact of the consistency of each on the encrypted file object that they are used to implement. The consistency of the file object is obviously essential to the consistency of the encrypted data retrieved. At the same time, the encryption key is used to protect the confidentiality of the data and to control access to the file. So, if consistency of the key object is violated, this could interfere with authorized users decrypting the data retrieved from the file object, or it might result in a stale key being used indefinitely, enabling revoked users to continue accessing the data. We thus argue that the consistency of both the key and file objects affects the consistency of the encrypted file object. Knowing the consistency of a key distribution and a file access protocol, our goal is to find necessary and sufficient conditions that ensure the consistency of the encrypted file that the key object and the file object are utilized to implement. The problem that we consider is related to the locality problem. A consistency condition is local if a history of operations on multiple objects satisfies the consistency condition if the restriction of the history to each object does so. However, locality is a very restrictive condition and, to our knowledge, only very powerful consistency conditions, such as linearizability, satisfy it. In contrast, the combined history of key and file operations can satisfy weaker conditions and still yield a consistent encrypted file. We give a generic definition of consistency (C 1, C 2 ) enc for an encrypted file object, starting from any consistency conditions C 1 and C 2 for the key and file objects that belong to one of the two classes of generic conditions we define. Intuitively, our consistency definition requires that there is an arrangement of key and file operations such that the most recent key write operation before each file operation seen by each client is the write of the key value used to encrypt the file contents. In addition, the arrangement of key and file operations should respect the desired consistency for the key and file operations. 1
6 1. S BS.write(c) from u: 2. FILE c 3. S BS.read() from u: 4. return FILE to u /* store c to the file object FILE*/ /* return content of file object FILE to u */ Figure 12: The code for the block store S BS 1. S CONS.vs request() from u: 2. return (msg vsl, v[1],..., v[u]) to u 3. S CONS.vs update(sign Ku (x)) from u: 4. verify the signature on x 5. if i = 1,..., U : x v[i] then abort 6. else v[u] x /* send the signed VSL to u */ /* abort if the signature does not verify */ /* check that x is greater than all version structures */ /* update the version structure for u */ Figure 13: The code for the consistency server S CONS but we skipped this for clarity of presentation. The code for the block store and the consistency server is in Figures 12 and 13, respectively. In the check cons protocol, the client first performs the vs request RPC with the consistency server to receive the list of version structures of all users. The client first checks the signatures on the version structures and checks that its own version structure matches the one stored locally (lines 15-16). Then, the client creates a new version structure x that contains the latest version number for each user (lines 17-20). In the new version structure, the client s version number is incremented by 1, and the integrity information is updated only for write operations. Finally, the client checks that the version structures are totally ordered and the new version structure created is the maximum of all (lines 21-22). This last check guarantees that the version structures for successive operations seen by each client are strictly increasing (with respect to the ordering relation defined for version structures). If any of the checks performed by the client fails, then the client detected misbehavior of S CONS and it aborts the protocol. The client sends the newly created signed version structure to the consistency server through the vs update RPC. S CONS checks that this version structure is the maximum of all existing version structures (line 5 in Figure 13) to protect against faulty clients. For more details and a proof of fork-consistency of this protocol, see [25]. Modifications to the SUNDR protocol. We include in the version structure v of user u a key sequence number v.seq, which is the most recent version of the key used by user u in a file operation. We extend the total order relation on version structures so that v w if v[i] w[i] for all i = 1,..., U and v.seq w.seq. For each write operation, we need to update the key sequence number in the newly created version structure (line 20 in Figure 11). The key sequence numbers in 23
7 the version structures guarantee that the file operations are serialized according to increasing key sequence numbers. 7.3 Consistency Analysis The file access protocol guarantees a forking serialization set for the file operations. Intuitively, the operations in a serialization for a process (which form a branch in the forking tree) have totally ordered version structures (by line 21 in Figure 11 and line 5 in Figure 13). We extend the version structures to include the key sequence numbers. The total order of the version structures implies that the file operations in a serialization for a process have increasing key sequence numbers. This will allow us to prove that a history of low-level operations resulting from an execution of the protocol is key-monotonic. Proposition 3. Let H l be a history of low-level read and write operations on the key object KEY and file object FILE that is obtained from an execution of the protocol in Figure 10. If H l KEY is sequential consistent and the file access protocol is implemented with the protocol in Figure 11, then the execution of the protocol is enc-consistent. Proof. Conditions (1), (2), (3) and (4) from Theorem 2 are satisfied. To apply the theorem, we only need to prove that H l is key-monotonic with respect to sequential consistency and fork consistency. In particular, it is enough to prove condition (SW-KM). Let S be any fork consistent forking serialization set of H l FILE and f 1 and f 2 two file write S operations such that f 1 f 2. Let vmax 1 and vmax 2 be the two version structures returned by the check cons protocol when f 1 and f 2 are executed. These are the version structures denoted by x created in lines of the protocol in Figure 11. The protocol guarantees that vmax 1 vmax, 2 which implies that vmax.seq 1 vmax.seq. 2 Line 20 in the protocol from Figure 11 guarantees that vmax.seq 1 contains the sequence number of the key with which the encrypted file content written in operation f 1 is encrypted. Similarly, vmax.seq 2 contains the sequence number of the key with which the value written in operation f 2 is encrypted. Let k 1 and k 2 be the key write operations such that R(k 1, f 1 ) and R(k 2, f 2 ). vmax.seq 1 vmax.seq 2 lo implies that k 1 k 2 or k 1 = k 2, which is exactly what condition (SW-KM) demands. From Theorem 2, it follows that the execution of the protocol is (C 1, C 2 ) enc -consistent, where C 1 is sequential consistency and C 2 is fork consistency. 8 Conclusions We have addressed the problem of consistency in encrypted file systems. An encrypted file system consists of two main components: a file access protocol and a key distribution protocol, which might be implemented via different protocols and infrastructures. We formally define generic consistency in encrypted file systems: for any consistency conditions C 1 and C 2 belonging to the classes we consider, we define a corresponding consistency condition for encrypted file systems, 24
8 (C 1, C 2 ) enc. The main result of our paper states that if each of the two protocols has some consistency guarantees with some restrictions, then ensuring that the history of low-level operation is key-monotonic is necessary and sufficient to obtain consistency for an encrypted file object. We also demonstrate how to implement a consistent encrypted file object from a sequential consistent key distribution protocol and the fork consistent file access protocol from the SUNDR file system [25, 22]. Another contribution of this paper is to define two classes of consistency conditions that are meaningful for encrypted file systems over untrusted storage: the first class includes classical consistency conditions such as linearizability, causal consistency, PRAM consistency and the second one extends fork consistency. An interesting problem is to find efficient implementations of the new forking consistency conditions from the second class and their relation with existing consistency conditions. The two classes do not cover all the existing (or possible) consistency conditions, and another challenge raised by this work is to define additional classes that are meaningful for consistency in encrypted file systems. References [1] A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proc. 5th Symposium on Operating System Design and Implementation (OSDI). Usenix, [2] M. Ahamad, R. Bazzi, R. John, P. Kohli, and G. Neiger. The power of processor consistency. Technical Report GIT-CC-92/34, Georgia Institute of Technology, [3] M. Ahamad, G. Neiger, J. Burns, P. Kohli, and P. Hutto. Causal memory: Definitions, implementation and programming. Distributed Computing, 1(9):37 49, [4] H. Attiya and J. L. Welch. Sequential consistency versus linearizability. ACM Transactions on Computer Systems, 12(2):91 122, [5] P.A. Bernstein, V. Hadzilacos, and N. Goodman. Concurrency Control and Recovery in Database Systems. Addison-Wesley, [6] B. Bershad, M. Zekauskas, and W. Sawdon. The Midway distributed shared-memory system. In Proc. IEEE COMPCON Conference, pages IEEE, [7] M. Blaze. A cryptographic file system for Unix. In Proc. First ACM Conference on Computer and Communication Security (CCS), pages ACM, [8] C. Cachin and J. A. Poritz. Secure intrusion-tolerant replication on the internet. In Proc. International Conference on Dependable Systems and Networks (DSN), pages IEEE,
9 [9] M. Castro and B. Liskov. Practical Byzantine fault tolerance. In Proc. 3rd Symposium on Operating System Design and Implementation (OSDI), pages Usenix, [10] G. Cattaneo, L. Catuogno, A. Del Sorbo, and P. Persiano. The design and implementation of a transparent cryptographic file system for Unix. In Proc. USENIX Annual Technical Conference 2001, Freenix Track, pages , [11] M. Dubois, C. Scheurich, and F.A. Briggs. Synchronization, coherence and event ordering in multiprocessors. IEEE Computer, 21(2):9 21, [12] R. Friedman, R. Vitenberg, and G. Chockler. On the composability of consistency conditions. Information Processing Letters, 86: , [13] K. Fu. Group sharing and random access in cryptographic storage file systems. Master s thesis, Massachusetts Institute of Technology, [14] K. Gharachorloo, D. Lenoski, J. Laudon, P. Gibbons, A. Gupta, and J.Hennessy. Memory consistency and event ordering in scalable shared-memory multiprocessors. In Proc. 17th Annual International Symposium on Computer Architecture, pages 15 26, [15] E. Goh, H. Shacham, N. Modadugu, and D. Boneh. SiRiUS: Securing remote untrusted storage. In Proc. Network and Distributed Systems Security (NDSS) Symposium 2003, pages ISOC, [16] J. Goodman. Cache consistency and sequential consistency. Technical Report 61, SCI Committee, [17] M. Herlihy and J. Wing. Linearizability: A corretness condition for concurrent objects. ACM Transactions on Programming Languages and Systems, 12(3): , [18] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proc. 2nd USENIX Conference on File and Storage Technologies (FAST), [19] S. Lakshmanan, M. Ahamad, and H. Venkateswaran:. A secure and highly available distributed store for meeting diverse data storage needs. In Proc. International Conference on Dependable Systems and Networks (DSN), pages IEEE, [20] L. Lamport. How to make a multiprocessor computer that correctly executes multiprocess programs. IEEE Transactions on Computers, 28(9): , [21] D. Lenoski, J. Laudon, K. Gharachorloo, W. D. Weber, A. Gupta, J. Hennessy, M. Horowitz, and M. S. Lam. The Stanford Dash multiprocessor. IEEE Computer, 25(3):63 79, [22] J. Li, M. Krohn, D. Mazieres, and D. Shasha. Secure untrusted data repository. In Proc. 6th Symposium on Operating System Design and Implementation (OSDI), pages Usenix,
10 [23] R. Lipton and J. Sandberg. Pram: A scalable shared memory. Technical Report CS-TR , Princeton University, Department of Computer Science, [24] D. Mazieres, M. Kaminsky, M. Kaashoek, and E. Witchel. Separating key management from file system security. In Proc. 17th ACM Symposium on Operating Systems (SOSP), pages ACM, [25] D. Mazieres and D. Shasha. Building secure file systems out of Byzantine storage. In Proc. 21st ACM Symposium on Principles of Distributed Computing (PODC), pages ACM, [26] R. Merkle. A cerified digital signature. In Proc. Crypto 1989, volume 435 of Lecture Notes in Computer Science, pages Springer-Verlag, [27] E. Miller, D. Long, W. Freeman, and B. Reed. Strong security for distributed file systems. In Proc. First USENIX Conference on File and Storage Technologies (FAST), pages 1 13, [28] E. Riedel, M. Kallahalla, and R. Swaminathan. A framework for evaluating storage system security. In Proc. First USENIX Conference on File and Storage Technologies (FAST), pages 15 30, [29] F. B. Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys, 22(4): , [30] F. J. Torres-Rojas, M. Ahamad, and M. Raynal. Timed consistency for shared distributed objects. In Proc. 18th ACM Symposium on Principles of Distributed Computing (PODC), pages ACM, [31] R. Vitenberg and R. Friedman. On the locality of consistency conditions. In Proc. 17th International Symposium on Distributed Computing (DISC)), pages , [32] H. Yu and A. Vahdat. Design and evaluation of a conit-based continuous consistency model for replicated services. ACM Transactions on Computer Systems, 20(3): ,
On Consistency of Encrypted Files
On Consistency of Encrypted Files Alina Oprea 1 and Michael K. Reiter 2 1 Computer cience Department, Carnegie Mellon University, Pittsburgh, PA, UA [email protected] 2 Electrical & Computer Engineering
Protocols for Secure Cloud Computing
IBM Research Zurich Christian Cachin 28 September 2010 Protocols for Secure Cloud Computing 2009 IBM Corporation Where is my data? 1985 2010 Who runs my computation? 1985 2010 IBM Research - Zurich Overview
Unity: Secure and Durable Personal Cloud Storage
Unity: Secure and Durable Personal Cloud Storage Beom Heyn Kim Computer Science University of Toronto Toronto, Canada [email protected] Wei Huang Electrical and Computer Engineering University of Toronto
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
SiRiUS: Securing Remote Untrusted Storage
SiRiUS: Securing Remote Untrusted Storage NDSS 2003 Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, and Dan Boneh Stanford University Introduction Secure network file systems not widespread. Why? 1. Hard
Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services
Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services Seth Gilbert Nancy Lynch Abstract When designing distributed web services, there are three properties that
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
How To Make A Correct Multiprocess Program Execute Correctly On A Multiprocedor
How to Make a Correct Multiprocess Program Execute Correctly on a Multiprocessor Leslie Lamport 1 Digital Equipment Corporation February 14, 1993 Minor revisions January 18, 1996 and September 14, 1996
An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730
A Review of Security Techniques in Public Cloud Database
A Review of Security Techniques in Public Cloud Database Pooja1, Dr.Dheerendra Singh2 Shaheed Udham Singh College of Engg, Tangori,Mohali, Punjab, India [email protected], [email protected]
On Limitations of Using Cloud Storage for Data Replication
On Limitations of Using Cloud Storage for Data Replication Christian Cachin IBM Research - Zurich Säumerstr. 4 CH-8803 Rüschlikon, Switzerland [email protected] Birgit Junker 1 Open Systems AG Räffelstrasse
TRUSTWORTHY STORAGE FOR SUPPORTING MODERATELY RELIABLE CLOUD SETTING
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE TRUSTWORTHY STORAGE FOR SUPPORTING MODERATELY RELIABLE CLOUD SETTING Uppala Hari Krishna 1, G.Krishna Veni 2 1 M.Tech Student, Dept
Integrity Protection for Revision Control
Integrity Protection for Revision Control Christian Cachin 1 and Martin Geisler 2 1 IBM Research, Zurich Research Laboratory, Switzerland, [email protected] 2 Department of Computer Science, University
Privacy Preservation and Secure Data Sharing in Cloud Storage
OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh
Plutus: scalable secure file sharing on untrusted storage
Plutus: scalable secure file sharing on untrusted storage Mahesh Kallahalla HP Labs Joint work with Erik Riedel (Seagate Research), Ram Swaminathan (HP Labs), Qian Wang (Penn State), Kevin Fu (MIT) March
Strong Security for Distributed File Systems
Strong Security for Distributed File Systems Ethan Miller Darrell Long William Freeman Benjamin Reed University of California, Santa CruzTRW IBM Research Abstract We have developed a scheme to secure networkattached
G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups
SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic s T.Vijayalakshmi 1, Balika J Chelliah 2 & R. Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M.
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
Locking Web Servers Using a File System
Consistency and Locking for Distributing Updates to Web Servers Using a File System Randal C. Burns and Robert M. Rees Darrell D. E. Long IBM Almaden Research Center Abstract University of California,
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters
COSC 6374 Parallel Computation Parallel I/O (I) I/O basics Spring 2008 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network
CSE 552: Distributed and Parallel Systems Instructor: Tom Anderson (tom@cs) TA: Lisa Glendenning (lglenden@cs)
CSE 552: Distributed and Parallel Systems Instructor: Tom Anderson (tom@cs) TA: Lisa Glendenning (lglenden@cs) MW 10:30 11:50 (some weeks WF) Savery 131 (pending) Overview: Large scale distributed systems
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
How To Understand The Concept Of A Distributed System
Distributed Operating Systems Introduction Ewa Niewiadomska-Szynkiewicz and Adam Kozakiewicz [email protected], [email protected] Institute of Control and Computation Engineering Warsaw University of
Distributed File Systems
Distributed File Systems Mauro Fruet University of Trento - Italy 2011/12/19 Mauro Fruet (UniTN) Distributed File Systems 2011/12/19 1 / 39 Outline 1 Distributed File Systems 2 The Google File System (GFS)
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
Data Deduplication Scheme for Cloud Storage
26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we
Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
Coda: A Highly Available File System for a Distributed Workstation Environment
Coda: A Highly Available File System for a Distributed Workstation Environment M. Satyanarayanan School of Computer Science Carnegie Mellon University Abstract Coda is a file system for a large-scale distributed
Byzantium: Byzantine-Fault-Tolerant Database Replication
Byzantium: Byzantine-Fault-Tolerant Database Replication Cristóvão Tavares Honorato INESC-ID and Instituto Superior Técnico [email protected] Abstract. Database systems are a key component behind
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances Jialin Zhang Tsinghua University [email protected] Wei Chen Microsoft Research Asia [email protected] Abstract
An Overview of Common Adversary Models
An Overview of Common Adversary Karl Palmskog [email protected] 2012-03-29 Introduction Requirements of Software Systems 1 Functional Correctness: partial, termination, liveness, safety,... 2 Nonfunctional
On the Ubiquity of Logging in Distributed File Systems
On the Ubiquity of Logging in Distributed File Systems M. Satyanarayanan James J. Kistler Puneet Kumar Hank Mashburn School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Logging is
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Processor Capacity Reserves: An Abstraction for Managing Processor Usage
Processor Capacity Reserves: An Abstraction for Managing Processor Usage Clifford W. Mercer, Stefan Savage, and Hideyuki Tokuda School of Computer Science Carnegie Mellon University Pittsburgh, Pennsylvania
ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE
ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE R.Genga devi 1, K.Anitha 2, M.Murugeshwari 3,S.vidhya 4, Dr.K.Ramasamy 5 1, 2, 3- UG STUDENT, P.S.R.RENGASAMY COLLEGE OF ENGINEERING
The Google File System
The Google File System Motivations of NFS NFS (Network File System) Allow to access files in other systems as local files Actually a network protocol (initially only one server) Simple and fast server
A Performance Analysis of Secure HTTP Protocol
A Performance Analysis of Secure Protocol Xubin He, Member, IEEE Department of Electrical and Computer Engineering Tennessee Technological University Cookeville, TN 3855, U.S.A [email protected] Abstract
Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations
Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant
Erasure correcting to enhance data security in cloud data storage
Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University [email protected] A.Sajeevram Department of computer science Vels University
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
Locality Based Protocol for MultiWriter Replication systems
Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin [email protected] One of the challenging problems in building replication
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking B.Sujana 1, P.Tejaswini 2, G.Srinivasulu 3, Sk.Karimulla 4 1,2,3,4 QUBA COLLEGE OF ENGINEERING & TECH, NELLORE Abstract:
Vorlesung Rechnerarchitektur 2 Seite 178 DASH
Vorlesung Rechnerarchitektur 2 Seite 178 Architecture for Shared () The -architecture is a cache coherent, NUMA multiprocessor system, developed at CSL-Stanford by John Hennessy, Daniel Lenoski, Monica
Distributed Software Systems
Consistency and Replication Distributed Software Systems Outline Consistency Models Approaches for implementing Sequential Consistency primary-backup approaches active replication using multicast communication
February. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
Building secure file systems out of Byzantine storage
Building secure file systems out of Byzantine storage David Mazières and Dennis Shasha NYU Department of Computer Science {dm,shasha}@cs.nyu.edu ABSTRACT This paper shows how to implement a trusted network
Secure Cloud Transactions by Performance, Accuracy, and Precision
Secure Cloud Transactions by Performance, Accuracy, and Precision Patil Vaibhav Nivrutti M.Tech Student, ABSTRACT: In distributed transactional database systems deployed over cloud servers, entities cooperate
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
Plutus: Scalable secure file sharing on untrusted storage
Plutus: Scalable secure file sharing on untrusted storage Mahesh Kallahalla Erik Riedel Ram Swaminathan Qian Wang Kevin Fu Hewlett Packard Labs Palo Alto, CA 94304 Abstract Plutus is a cryptographic storage
STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM
STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM Albert M. K. Cheng, Shaohong Fang Department of Computer Science University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
Network File System (NFS) Pradipta De [email protected]
Network File System (NFS) Pradipta De [email protected] Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS
A Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Verifying Semantic of System Composition for an Aspect-Oriented Approach
2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach
Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas
3. Replication Replication Goal: Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas Problems: Partial failures of replicas and messages No
DYNAMIC SECURE SYSTEM FOR DETECTING AND ELIMINATING FRAUDULENCE IN CLOUD STORAGE
DYNAMIC SECURE SYSTEM FOR DETECTING AND ELIMINATING FRAUDULENCE IN CLOUD STORAGE Kalaivani A 1, Ranjith Kumar M 2, Sabarish M 3, Sai Kishore R 4 Assistant Professor, Dept. of CSE, R.M.K College of Engineering
A distributed system is defined as
A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
CSE 544 Principles of Database Management Systems. Magdalena Balazinska Fall 2007 Lecture 5 - DBMS Architecture
CSE 544 Principles of Database Management Systems Magdalena Balazinska Fall 2007 Lecture 5 - DBMS Architecture References Anatomy of a database system. J. Hellerstein and M. Stonebraker. In Red Book (4th
Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing
Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing Cloud storage systems The rise of big data on cloud computing: Review and open research issues Consistency models
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
Optimized Cryptonite System for Secure Data Storage on Cloud using Merkle Hash Tree
Optimized Cryptonite System for Secure Data Storage on Cloud using Merkle Hash Tree Anjali Almale 1, Prof. Y. B. Gurav 2 and Prof. S. V. Phulari 3 1 Anjali Almale, PG Student, PVPIT, Pune 2 Prof. Y. B.
CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction
Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai
Security related to the information designing or even media editing. This enables users
A Potential Cloud Service by Auditing Cloud MalaimariSuganya.P 1, Padma Priya.R 2 1 Department of Computer Science and Information Technology Nadar Saraswathi College of Arts and Science, Theni dt-625531,
A Locally Cache-Coherent Multiprocessor Architecture
A Locally Cache-Coherent Multiprocessor Architecture Kevin Rich Computing Research Group Lawrence Livermore National Laboratory Livermore, CA 94551 Norman Matloff Division of Computer Science University
Preserving Message Integrity in Dynamic Process Migration
Preserving Message Integrity in Dynamic Process Migration E. Heymann, F. Tinetti, E. Luque Universidad Autónoma de Barcelona Departamento de Informática 8193 - Bellaterra, Barcelona, Spain e-mail: [email protected]
CHAPTER 7 SUMMARY AND CONCLUSION
179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel
