Offline Authentication of Untrusted Storage
We extend the offline memory correctness checking scheme presented by Blum et. al [BEG+91], by using incremental cryptography, to detect attacks by an active adversary. We also introduce a hybrid o_ine-online checking scheme designed for untrusted storages in file systems and databases. Previous wor...
Main Authors: | , , , , |
---|---|
Published: |
2023
|
Online Access: | https://hdl.handle.net/1721.1/149320 |
_version_ | 1826216267418173440 |
---|---|
author | Clarke, Dwaine Gassend, Blaise Suh, G. Edward van Dijk, Marten Devadas, Srinivas |
author_facet | Clarke, Dwaine Gassend, Blaise Suh, G. Edward van Dijk, Marten Devadas, Srinivas |
author_sort | Clarke, Dwaine |
collection | MIT |
description | We extend the offline memory correctness checking scheme presented by Blum et. al [BEG+91], by using incremental cryptography, to detect attacks by an active adversary. We also introduce a hybrid o_ine-online checking scheme designed for untrusted storages in file systems and databases. Previous work [GSC+02] [FKM00] [MVS00] describe systems in which Merkle trees are used to verify the authenticity of data stored on untrusted storage. The Merkle trees [Mer79] are used to check, after each operation, whether the storage performed correctly. The offline and hybrid checkers are designed for checking sequences of operations on an untrusted storage and, in the common case, require only a constant overhead on the number of accesses to the storage, as compared to the logarithmic overhead incurred by online Merkle tree schemes |
first_indexed | 2024-09-23T16:44:59Z |
id | mit-1721.1/149320 |
institution | Massachusetts Institute of Technology |
last_indexed | 2024-09-23T16:44:59Z |
publishDate | 2023 |
record_format | dspace |
spelling | mit-1721.1/1493202023-03-30T03:03:52Z Offline Authentication of Untrusted Storage Clarke, Dwaine Gassend, Blaise Suh, G. Edward van Dijk, Marten Devadas, Srinivas We extend the offline memory correctness checking scheme presented by Blum et. al [BEG+91], by using incremental cryptography, to detect attacks by an active adversary. We also introduce a hybrid o_ine-online checking scheme designed for untrusted storages in file systems and databases. Previous work [GSC+02] [FKM00] [MVS00] describe systems in which Merkle trees are used to verify the authenticity of data stored on untrusted storage. The Merkle trees [Mer79] are used to check, after each operation, whether the storage performed correctly. The offline and hybrid checkers are designed for checking sequences of operations on an untrusted storage and, in the common case, require only a constant overhead on the number of accesses to the storage, as compared to the logarithmic overhead incurred by online Merkle tree schemes 2023-03-29T14:42:58Z 2023-03-29T14:42:58Z 2002-08 https://hdl.handle.net/1721.1/149320 MIT-LCS-TM-631 application/pdf |
spellingShingle | Clarke, Dwaine Gassend, Blaise Suh, G. Edward van Dijk, Marten Devadas, Srinivas Offline Authentication of Untrusted Storage |
title | Offline Authentication of Untrusted Storage |
title_full | Offline Authentication of Untrusted Storage |
title_fullStr | Offline Authentication of Untrusted Storage |
title_full_unstemmed | Offline Authentication of Untrusted Storage |
title_short | Offline Authentication of Untrusted Storage |
title_sort | offline authentication of untrusted storage |
url | https://hdl.handle.net/1721.1/149320 |
work_keys_str_mv | AT clarkedwaine offlineauthenticationofuntrustedstorage AT gassendblaise offlineauthenticationofuntrustedstorage AT suhgedward offlineauthenticationofuntrustedstorage AT vandijkmarten offlineauthenticationofuntrustedstorage AT devadassrinivas offlineauthenticationofuntrustedstorage |