2015 IEEE International Symposium on Information Theory (ISIT) 2015
DOI: 10.1109/isit.2015.7282724
|View full text |Cite
|
Sign up to set email alerts
|

STEP-archival: Storage integrity and anti-tampering using data entanglement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…We presented a preliminary version of this work at the 2015 International Symposium on Information Theory [31]. This extended version includes additional material such as the hardness of the optimal attack, additional suboptimal attacks, extended simulations, the proofs, implementation details, and a comprehensive discussion of the security and implementation strengths and weaknesses of the architecture.…”
Section: Publication Notementioning
confidence: 99%
“…We presented a preliminary version of this work at the 2015 International Symposium on Information Theory [31]. This extended version includes additional material such as the hardness of the optimal attack, additional suboptimal attacks, extended simulations, the proofs, implementation details, and a comprehensive discussion of the security and implementation strengths and weaknesses of the architecture.…”
Section: Publication Notementioning
confidence: 99%
“…If the system creates strong dependencies among the files, data loss can be recovered by exploiting the relationships between files. The idea was explored in Tangler [25], Dagster [26], STEP-archival [41] and Entangled Cloud [42]. Aspnes et al studied the theoretical aspects [23].…”
Section: ) Metric: Data Lossmentioning
confidence: 99%
“…The encrypted object, the secret key, and the cipher type are then divided using secret sharing. Some systems offer censorship-resistant storage by creating dependencies, or entanglement, across stored data [22]. Such entanglement makes it difficult for unauthorized parties to censor or tamper with data, but usually require modifying the implementation of storage backends.…”
Section: B Secure Multi-cloudmentioning
confidence: 99%
“…A censorship resistant system makes it difficult to selectively refuse to answer requests without denying service for other unrelated requests. The following three levels of censorship resistance (CR) were defined in [22]:…”
Section: Storage Security For End Usersmentioning
confidence: 99%