Authenticated storage using small trusted hardware
A major security concern with outsourcing data storage to third-party providers is authenticating the integrity and freshness of data. State-of-the-art software-based approaches require clients to maintain state and cannot immediately detect forking attacks, while approaches that introduce limited t...
Main Authors: | Yang, Hsin-Jung, Zeldovich, Nickolai, Devadas, Srinivas, Costan, Victor Marius |
---|---|
Other Authors: | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory |
Format: | Article |
Language: | en_US |
Published: |
Association for Computing Machinery (ACM)
2014
|
Online Access: | http://hdl.handle.net/1721.1/86161 https://orcid.org/0000-0001-8253-7714 https://orcid.org/0000-0002-0990-7763 https://orcid.org/0000-0003-0238-2703 https://orcid.org/0000-0002-7770-1273 |
Similar Items
-
Security challenges and opportunities in adaptive and reconfigurable hardware
by: Costan, Victor Marius, et al.
Published: (2012) -
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
by: Costan, Victor, et al.
Published: (2021) -
Efficient trusted cloud storage using parallel, pipelined hardware
by: Yang, Hsin-Jung
Published: (2012) -
Offline Authentication of Untrusted Storage
by: Clarke, Dwaine, et al.
Published: (2023) -
A commodity trusted computing module
by: Costan, Victor Marius
Published: (2009)