Authenticated storage using small trusted hardware
A major security concern with outsourcing data storage to third-party providers is authenticating the integrity and freshness of data. State-of-the-art software-based approaches require clients to maintain state and cannot immediately detect forking attacks, while approaches that introduce limited t...
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | en_US |
Published: |
Association for Computing Machinery (ACM)
2014
|
Online Access: | http://hdl.handle.net/1721.1/86161 https://orcid.org/0000-0001-8253-7714 https://orcid.org/0000-0002-0990-7763 https://orcid.org/0000-0003-0238-2703 https://orcid.org/0000-0002-7770-1273 |