Pesto: A Persistent Private Storage System

نویسنده

  • Feike W. Dillema
چکیده

We can say that a personal computer is one that is available to the user when he wants to use it, while a private computer is one that is never available to others. We use the term private computing to describe the computational model which involves small, private, hand-held computers, i.e. Personal Digital Assistants (pdas). In general, a pda offers its user relatively few resources; a low-bandwidth user-interface, (relatively) low computational power, and highly variable communication resources. However, the pda excels in two aspect: Trust and Availability. A pda that is carried by its owner has great potential to be his private computer, an attractive sanctuary for private data and computations (such as creating digital signatures). Availability means that the pda can be used in new settings, but availability also means physical control over the device. Physical control is a prerequisite for secure operation of almost any device. With trust in the private computer itself in place, the challenge of private computing is to use a pda as solid ground from where to extend a user’s sphere of control to distributed and less-trusted resources he cares to use in a variety of different settings. The trend towards mobile computing adds the requirement that users should be able to roam between many different environments. Independent of what administrative domain they roam into, they want access to their personal resources while using resources available in that domain. As a general rule, we can say that policies, mechanisms and resources are different in each environment and system, and a lot of machinery between systems is necessary in order to maintain and achieve important nonfunctional aspects like security and safety across systems. However, creating this machinery is often impossible because policies and available mechanisms in the different domains are too diverse. We believe that ubiquitous computing requires a platform for distributed systems and applications that makes no assumptions on the environment the user currently is in. There are basically two possible ways to support private computing. One can either build all the required machinery into the applications, or one can provide the applications with an underlying infrastructure. The latter approach leaves

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Taste of Pesto

The Pesto distributed storage platform is geared towards a computing model where private machines play a pivotal rôle. We argue that no centralized solutions are acceptable in its design and that it supports allocation of separate tasks to separate system components found in its target environment. Hence, Pesto separates trust from responsibility, storage from access control policy, and replica...

متن کامل

Security in Pesto

Pesto aims at providing highly available and secure storage for long-lived data to mobile users roaming into (potentially) untrusted environments. This paper presents and discusses the security mechanisms and features of Pesto. Security in Pesto encompasses the following three aspects: availability, safety, and privacy. Most existing systems focus on a subset of these aspects, or assume they ca...

متن کامل

Pesto Flavoured Security

We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our encryption framework allows the revocation of previously granted rights. The number of keys to be managed explicitly grows linearly with the number of access control policies a user defines, making security manageable....

متن کامل

A Log-Structured Persistent Store

Persistent stores have been implemented using a variety of storage technologies including shadow paging, log-based and log-structured approaches. Here we compare these approaches and advocate the use of log-structuring. The advantages of such a technique include efficient support for large (64 bit) address spaces, scalability and fast snapshot processing. We describe the architecture of a new l...

متن کامل

Cryptographic Access Control in the PESTO File System

In the PESTO file system, the complete file update history is kept as a tree of file versions. It will often be desirable to give access to subsets of the file versions history without having to grant access to the entire tree. Keys on Trees is a scheme for assigning attributes to every tree node in such a way that knowledge of the attribute of one node makes it possible to calculate the attrib...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006