Integrity and Consistency for Untrusted Services
نویسنده
چکیده
A group of mutually trusting clients outsources an arbitrary computation service to a remote provider, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the integrity of the stored data, the correctness of the remote computation process, and the consistency of the provider’s responses. We present a novel protocol that guarantees atomic operations to all clients when the provider is correct and fork-linearizable semantics when it is faulty; this means that all clients which observe each other’s operations are consistent, in the sense that their own operations, plus those operations whose effects they see, have occurred atomically in same sequence. This protocol generalizes previous approaches that provided such guarantees only for outsourced storage services.
منابع مشابه
A Don’t Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores
More and more data is outsourced to the cloud, and collaborating on a shared resource using cloud services has become easier than ever. Programmers work together on online source code repositories, global project teams produce technical deliverables, and friends share their photo albums. Nevertheless, the clients need to trust the cloud provider as they rely on it for the confidentiality and co...
متن کاملBuilding secure file systems out of Byzantine storage
This paper shows how to implement a trusted network file system on an untrusted server. While cryptographic storage techniques exist that allow users to keep data secret from untrusted servers, this work concentrates on the detection of tampering attacks and stale data. Ideally, users of an untrusted storage server would immediately and unconditionally notice any misbehavior on the part of the ...
متن کاملPreserving Integrity in Remote File Location and Retrieval
We present a service for locating and retrieving les from an untrusted network such that the integrity of the retrieved les can be veri ed. This service enables groups of people in geographically remote locations to share les using an untrusted network. For example, distribution of an organization's software to all the organization's sites can be accomplished using this service. Distribution of...
متن کاملPreserving Integrity in RemoteFile
We present a service for locating and retrieving les from an untrusted network such that the integrity of the retrieved les can be veriied. This service enables groups of people in geographically remote locations to share les using an untrusted network. For example, distribution of an organization's software to all the or-ganization's sites can be accomplished using this service. Distribution o...
متن کاملPreserving Integrity in
We present a service for locating and retrieving les from an untrusted network such that the integrity of the retrieved les can be veriied. This service enables groups of people in geographically remote locations to share les using an untrusted network. For example, distribution of an organization's software to all the or-ganization's sites can be accomplished using this service. Distribution o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010