Implementing a Tamper-Evident Database System
نویسندگان
چکیده
Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount of trusted client-side computation to achieve guarantees of integrity when interacting with a vulnerable or untrusted database server. To achieve this goal we describe a novel relational hash tree, designed for efficient database processing, and evaluate the performance penalty for integrity guarantees. We show that strong cryptographic guarantees of integrity can be provided in a relational database with modest overhead.
منابع مشابه
A Theory of Integrating Tamper Evidence with Stabilization
We propose the notion of tamper-evident stabilization –that combines stabilization with the concept of tamper evidence– for computing systems. On the first glance, these notions are contradictory; stabilization requires that eventually the system functionality is fully restored whereas tamper evidence requires that the system functionality is permanently degraded in the event of tampering. Tamp...
متن کاملSmall TCBs of policy-controlled operating systems
IT systems with advanced security requirements increasingly apply problem-specific security policies for describing, analyzing, and implementing security properties. Security policies are a vital part of a system’s trusted computing base (TCB). Hence, both correctness and tamper-proofness of a TCB’s implementation are essential for establishing, preserving, and guaranteeing a system’s security ...
متن کاملTowards Tamper-evident Storage on Patterned Media
We propose a tamper-evident storage system based on probe storage with a patterned magnetic medium. This medium supports normal read/write operations by outof-plane magnetisation of individual magnetic dots. We report on measurements showing that in principle the medium also supports a separate class of write-once operation that destroys the out-of-plane magnetisation property of the dots irrev...
متن کاملThe aegis Processor Architecture for Tamper-Evident and Tamper-Resistant Processing
We describe the architecture of the aegis processor which can be used to build computing systems secure against both physical and software attacks. aegis assumes that the operating system and all components external to it, such as memory, are untrusted. aegis provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be dete...
متن کاملTamper-Evident Complex Genomic Networks
Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between indivi...
متن کامل