Offline Authentication of Untrusted Storage

We extend the offline memory correctness checking scheme presented by Blum et. al [BEG+91], by using incremental cryptography, to detect attacks by an active adversary. We also introduce a hybrid o_ine-online checking scheme designed for untrusted storages in file systems and databases. Previous wor...

Full description

Bibliographic Details
Main Authors: Clarke, Dwaine, Gassend, Blaise, Suh, G. Edward, van Dijk, Marten, Devadas, Srinivas
Published: 2023
Online Access:https://hdl.handle.net/1721.1/149320
_version_ 1826216267418173440
author Clarke, Dwaine
Gassend, Blaise
Suh, G. Edward
van Dijk, Marten
Devadas, Srinivas
author_facet Clarke, Dwaine
Gassend, Blaise
Suh, G. Edward
van Dijk, Marten
Devadas, Srinivas
author_sort Clarke, Dwaine
collection MIT
description We extend the offline memory correctness checking scheme presented by Blum et. al [BEG+91], by using incremental cryptography, to detect attacks by an active adversary. We also introduce a hybrid o_ine-online checking scheme designed for untrusted storages in file systems and databases. Previous work [GSC+02] [FKM00] [MVS00] describe systems in which Merkle trees are used to verify the authenticity of data stored on untrusted storage. The Merkle trees [Mer79] are used to check, after each operation, whether the storage performed correctly. The offline and hybrid checkers are designed for checking sequences of operations on an untrusted storage and, in the common case, require only a constant overhead on the number of accesses to the storage, as compared to the logarithmic overhead incurred by online Merkle tree schemes
first_indexed 2024-09-23T16:44:59Z
id mit-1721.1/149320
institution Massachusetts Institute of Technology
last_indexed 2024-09-23T16:44:59Z
publishDate 2023
record_format dspace
spelling mit-1721.1/1493202023-03-30T03:03:52Z Offline Authentication of Untrusted Storage Clarke, Dwaine Gassend, Blaise Suh, G. Edward van Dijk, Marten Devadas, Srinivas We extend the offline memory correctness checking scheme presented by Blum et. al [BEG+91], by using incremental cryptography, to detect attacks by an active adversary. We also introduce a hybrid o_ine-online checking scheme designed for untrusted storages in file systems and databases. Previous work [GSC+02] [FKM00] [MVS00] describe systems in which Merkle trees are used to verify the authenticity of data stored on untrusted storage. The Merkle trees [Mer79] are used to check, after each operation, whether the storage performed correctly. The offline and hybrid checkers are designed for checking sequences of operations on an untrusted storage and, in the common case, require only a constant overhead on the number of accesses to the storage, as compared to the logarithmic overhead incurred by online Merkle tree schemes 2023-03-29T14:42:58Z 2023-03-29T14:42:58Z 2002-08 https://hdl.handle.net/1721.1/149320 MIT-LCS-TM-631 application/pdf
spellingShingle Clarke, Dwaine
Gassend, Blaise
Suh, G. Edward
van Dijk, Marten
Devadas, Srinivas
Offline Authentication of Untrusted Storage
title Offline Authentication of Untrusted Storage
title_full Offline Authentication of Untrusted Storage
title_fullStr Offline Authentication of Untrusted Storage
title_full_unstemmed Offline Authentication of Untrusted Storage
title_short Offline Authentication of Untrusted Storage
title_sort offline authentication of untrusted storage
url https://hdl.handle.net/1721.1/149320
work_keys_str_mv AT clarkedwaine offlineauthenticationofuntrustedstorage
AT gassendblaise offlineauthenticationofuntrustedstorage
AT suhgedward offlineauthenticationofuntrustedstorage
AT vandijkmarten offlineauthenticationofuntrustedstorage
AT devadassrinivas offlineauthenticationofuntrustedstorage