Proceedings of the 2009 ACM Workshop on Cloud Computing Security 2009
DOI: 10.1145/1655008.1655017
|View full text |Cite
|
Sign up to set email alerts
|

On protecting integrity and confidentiality of cryptographic file system for outsourced storage

Abstract: A cryptographic network file system has to guarantee confidentiality and integrity of its files, and also it has to support random access. For this purpose, existing designs mainly rely on (often ad-hoc) combination of Merkle hash tree with a block cipher mode of encryption. In this paper, we propose a new design based on a MAC tree construction which uses a universal-hash based stateful MAC. This new design enables standard model security proof and also better performance compared with Merkle hash tree. We fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0
1

Year Published

2010
2010
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(13 citation statements)
references
References 19 publications
0
12
0
1
Order By: Relevance
“…a number of the studies propose to use threshold secrete sharing to take care of strength of key management however they are doing not think about de-duplication commonplace cryptography makes de-duplication not possible. [2,3,4] It proposes the proofs of possession for de-duplication system specified shopper will with efficiency persuade the cloud storage server that he/she owns a file while not uploading file itself. However these approaches don't think about data privacy.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…a number of the studies propose to use threshold secrete sharing to take care of strength of key management however they are doing not think about de-duplication commonplace cryptography makes de-duplication not possible. [2,3,4] It proposes the proofs of possession for de-duplication system specified shopper will with efficiency persuade the cloud storage server that he/she owns a file while not uploading file itself. However these approaches don't think about data privacy.…”
Section: Background and Related Workmentioning
confidence: 99%
“…To protect the confidentiality of outsourced data, varied cryptological solutions are planned within the literature (e.g., [2], [3], [4]). Their plan builds on traditional(symmetric) cryptography, during which every user encrypts data with associate degree freelance secret key.…”
Section: Traditional Cryptographymentioning
confidence: 99%
“…Secure solutions that are compatible with existing public cloud storage services have been proposed. Yun et al [40] propose a cryptographic file system that provides privacy and integrity guarantees for outsourced data using a universal-hash based MAC tree. They prototype a system that can interact with an untrusted storage server via a modified file system.…”
Section: Related Workmentioning
confidence: 99%
“…Yun et al [24] propose a cryptographic file system that provides privacy and integrity guarantees for outsourced data using a universalhash based MAC tree. They prototype a system that can interact with an untrusted storage server via a modified file system.…”
Section: Related Workmentioning
confidence: 99%