Towards Tamper-evident Storage on Patterned Media
نویسندگان
چکیده
We propose a tamper-evident storage system based on probe storage with a patterned magnetic medium. This medium supports normal read/write operations by outof-plane magnetisation of individual magnetic dots. We report on measurements showing that in principle the medium also supports a separate class of write-once operation that destroys the out-of-plane magnetisation property of the dots irreversibly by precise local heating. We discuss the main issues of designing a tamper-evident storage device and file system using the properties of the medium.
منابع مشابه
Towards compliant data retention with probe storage on patterned media
We describe how the compliance requirements for data retention from recent laws such as the US Sarbanes Oxley Act may be supported by a tamper-evident secure storage system based on probe storage with a patterned magnetic medium. This medium supports normal read/write operations by out-of-plane magnetisation of individual dots. We report on an experiment to show that in principle the medium als...
متن کاملDesign Rationale for Secure Probe Storage based on Patterned Magnetic Media
We describe the design rationale for a hardware tamper resistant secure storage system based on probe storage with a patterned magnetic medium. This medium supports normal read/write operations by magnetising individual dots perpendicular to the media plane. We report on an experiment to show that in principle the medium also supports a separate class of read/write-once operations by allowing i...
متن کاملTamper-Evident Complex Genomic Networks
Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between indivi...
متن کاملTEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks
Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory integrity. With a trusted System-on-Chip, the existing countermeasures against replay require a large amount of on-chip memory to provide tamper-proof storage for metadata such as hash values or nonces. Tree-based strategies can be deployed to reduce this unacceptable overhead; for example, the well-kno...
متن کاملSecuring Shared Untrusted Storage by using TPM 1.2 Without Requiring a Trusted OS
We address the problem of using an untrusted server with a trusted platform module (TPM) to provide trusted storage for a large number of clients, where each client may own and use several different devices that may be offline at different times and may not be able to communicate with each other except through the untrusted server (over an untrusted network). The clients only trust the server’s...
متن کامل