Trusted storage

نویسندگان

  • Anjo Vahldiek
  • Eslam Elnikety
  • Peter Druschel
  • Deepak Garg
  • Johannes Gehrke
  • Rodrigo Rodrigues
چکیده

We study the properties, design, implementation and performance of trusted storage, an architecture that ensures the integrity, confidentiality and accountability of data, by enforcing storage policies at the lowest layer of a storage system, within the hardware and firmware of disk enclosures. The guarantees provided by trusted storage depend only on the integrity and correctness of the trusted device/enclosure firmware and hardware, not on the absence of bugs and security vulnerabilities in any higher level software of a system and operator error or malice. Trusted storage primitives enable applications to associate and enforce a policy with each data object they create, and to obtain firmware-generated, cryptographically signed certificates, which attest to a given stored data object’s name and content hash, the policy in effect for the object, access history for the object, as well as certain properties of the device including its approximate location. A typical policy states the conditions under which a data object may be read, updated, or deleted, to what extent access to the object should be recorded, how often the object should be scrubbed, and the conditions under which the policy may be changed. To implement this functionality, each trusted storage device has a globally unique identifier and a unique hardware-protected asymmetric cryptographic private key, whose corresponding public key is certified by the manufacturer. Using this private key, the device can cryptographically sign messages, generate short-term session keys and establish secure connections to other trusted storage devices, trusted servers (e.g. time, location, firmware update) and client computers by tunnelling securely through the (untrusted) operating system. Trusted storage addresses the problems created by two complementary trends in computing. On the one hand, both the volume and the value of digitally stored data

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pesos: Policy Enhanced Secure Object Store

Third-party storage services pose the risk of integrity and confidentiality violations as the current storage policy enforcementmechanismsare spread acrossmany layers in the system stack. To mitigate these security vulnerabilities, we present the design and implementation of Pesos, a Policy Enhanced Secure Object Store (Pesos) for untrusted third-party storage providers. Pesos allows clients to...

متن کامل

cTPM: A Cloud TPM for Cross-Device Trusted Applications

Current Trusted Platform Modules (TPMs) are illsuited for use in mobile services because they hinder sharing data across multiple devices seamlessly, they lack access to a trusted real-time clock, and their nonvolatile storage performs poorly. This paper presents cloud TPM (cTPM), an extension of the TPM’s design to address these problems. cTPM includes two features: 1) a cloud seed shared betw...

متن کامل

A Way of Key Management in Cloud Storage Based on Trusted Computing

Cloud security has gained increasingly emphasis in the research community, with much focus primary concentrated on how to secure the operation system and virtual machine on which cloud system runs on. We take an alternative perspective to consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted b...

متن کامل

Optimistic Fair Exchange Using Trusted Devices

Efficiency of optimistic fair exchange using trusted devices is studied. Pfitzmann, Schunter and Waidner (PODC 1998) have shown that four messages in the main sub-protocol is optimal when exchanging idempotent items using non-trusted devices. It is straightforward that when using trusted devices for exchanging nonidempotent items this number can be reduced to three. This however comes at the co...

متن کامل

Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing

Benefited from cloud storage services, users can save their cost of buying expensive storage and application servers, as well as deploying and maintaining applications. Meanwhile they lost the physical control of their data. So effective methods are needed to verify the correctness of the data stored at cloud servers, which are the research issues the Provable Data Possession (PDP) faced. The m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012