Authenticated storage using small trusted hardware

A major security concern with outsourcing data storage to third-party providers is authenticating the integrity and freshness of data. State-of-the-art software-based approaches require clients to maintain state and cannot immediately detect forking attacks, while approaches that introduce limited t...

Full description

Bibliographic Details
Main Authors: Yang, Hsin-Jung, Zeldovich, Nickolai, Devadas, Srinivas, Costan, Victor Marius
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Format: Article
Language:en_US
Published: Association for Computing Machinery (ACM) 2014
Online Access:http://hdl.handle.net/1721.1/86161
https://orcid.org/0000-0001-8253-7714
https://orcid.org/0000-0002-0990-7763
https://orcid.org/0000-0003-0238-2703
https://orcid.org/0000-0002-7770-1273