Cryptographic Access Control in the PESTO File System
نویسندگان
چکیده
In the PESTO file system, the complete file update history is kept as a tree of file versions. It will often be desirable to give access to subsets of the file versions history without having to grant access to the entire tree. Keys on Trees is a scheme for assigning attributes to every tree node in such a way that knowledge of the attribute of one node makes it possible to calculate the attribute of every subnode, but impossible to calculate the attribute of any other nodes. This paper describes Keys on Trees and how it is intended applied in PESTO.
منابع مشابه
The Taste of Pesto
The Pesto distributed storage platform is geared towards a computing model where private machines play a pivotal rôle. We argue that no centralized solutions are acceptable in its design and that it supports allocation of separate tasks to separate system components found in its target environment. Hence, Pesto separates trust from responsibility, storage from access control policy, and replica...
متن کاملPesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our encryption framework allows the revocation of previously granted rights. The number of keys to be managed explicitly grows linearly with the number of access control policies a user defines, making security manageable....
متن کاملSecurity in Pesto
Pesto aims at providing highly available and secure storage for long-lived data to mobile users roaming into (potentially) untrusted environments. This paper presents and discusses the security mechanisms and features of Pesto. Security in Pesto encompasses the following three aspects: availability, safety, and privacy. Most existing systems focus on a subset of these aspects, or assume they ca...
متن کاملFormal Analysis of Dynamic, Distributed File-System Access Controls
We model networked storage systems with distributed, cryptographically enforced file-access control in an applied pi calculus. The calculus contains cryptographic primitives and supports file-system constructs, including access revocation. We establish that the networked storage systems implement simpler, centralized storage specifications with local access-control checks. More specifically, we...
متن کاملSiRiUS: Securing Remote Untrusted Storage
This paper presents SiRiUS, a secure file system designed to be layered over insecure network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase. SiRiUS assumes the network storage is untrusted and provides its own read-write cryptographic access control for file level sharing. Key management and revocation is simple with minimal out-of-band communication. File system fres...
متن کامل