Integrity and Consistency for Untrusted Services

نویسنده

  • Christian Cachin
چکیده

A group of mutually trusting clients outsources an arbitrary computation service to a remote provider, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the integrity of the stored data, the correctness of the remote computation process, and the consistency of the provider’s responses. We present a novel protocol that guarantees atomic operations to all clients when the provider is correct and fork-linearizable semantics when it is faulty; this means that all clients which observe each other’s operations are consistent, in the sense that their own operations, plus those operations whose effects they see, have occurred atomically in same sequence. This protocol generalizes previous approaches that provided such guarantees only for outsourced storage services.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Don’t Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores

More and more data is outsourced to the cloud, and collaborating on a shared resource using cloud services has become easier than ever. Programmers work together on online source code repositories, global project teams produce technical deliverables, and friends share their photo albums. Nevertheless, the clients need to trust the cloud provider as they rely on it for the confidentiality and co...

متن کامل

Building secure file systems out of Byzantine storage

This paper shows how to implement a trusted network file system on an untrusted server. While cryptographic storage techniques exist that allow users to keep data secret from untrusted servers, this work concentrates on the detection of tampering attacks and stale data. Ideally, users of an untrusted storage server would immediately and unconditionally notice any misbehavior on the part of the ...

متن کامل

Preserving Integrity in Remote File Location and Retrieval

We present a service for locating and retrieving les from an untrusted network such that the integrity of the retrieved les can be veri ed. This service enables groups of people in geographically remote locations to share les using an untrusted network. For example, distribution of an organization's software to all the organization's sites can be accomplished using this service. Distribution of...

متن کامل

Preserving Integrity in RemoteFile

We present a service for locating and retrieving les from an untrusted network such that the integrity of the retrieved les can be veriied. This service enables groups of people in geographically remote locations to share les using an untrusted network. For example, distribution of an organization's software to all the or-ganization's sites can be accomplished using this service. Distribution o...

متن کامل

Preserving Integrity in

We present a service for locating and retrieving les from an untrusted network such that the integrity of the retrieved les can be veriied. This service enables groups of people in geographically remote locations to share les using an untrusted network. For example, distribution of an organization's software to all the or-ganization's sites can be accomplished using this service. Distribution o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010