Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers
نویسندگان
چکیده
This paper analyzes the problem of checking the integrity of files stored on remote servers. Since servers are prone to successful attacks by malicious hackers, the result of simple integrity checks run on the servers cannot be trusted. Conversely, downloading the files from the server to the verifying host is impractical. Two solutions are proposed, based on challenge-response
منابع مشابه
A Dynamic Proxy Oriented Approach for Remote Data Integrity checking along with Secure Deduplication in Cloud
In Cloud computing users store data over remote servers instead of computer’s hard drive. This leads to several security problems since data is out of the control of the user. So, to protect against the security attacks and to preserve the data integrity in the cloud, Huaqun Wang et.al proposed proxy oriented remote data integrity checking (RDIC). However, this scheme only focuses on one-way va...
متن کاملRE-TRUST: Trustworthy Execution of SW on Remote Untrusted Platforms
A major challenge in software security is preserving software integrity. Traditionally, this problem is addressed through the development of software (self-) checking techniques that verify the integrity of its code and execution. Unfortunately, no satisfactory solutions for run-time verification of software integrity have been presented. In this paper, we approach the problem of run-time softw...
متن کاملGlobal Heuristic Search on Encrypted Data (GHSED)
Important document are being kept encrypted in remote servers. In order to retrieve these encrypted data, efficient search methods needed to enable the retrieval of the document without knowing the content of the documents In this paper a technique called a global heuristic search on encrypted data (GHSED) technique will be described for search in an encrypted files using public key encryption ...
متن کاملIntegrity and Consistency for Untrusted Services
A group of mutually trusting clients outsources an arbitrary computation service to a remote provider, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the integrity of the stored data, the correctness of the remote computation process, and the consistency of the provider’s responses. We present a novel pro...
متن کاملProving Possession and Retrievability within a Cloud Environment: A Comparative Survey
Outsourcing data to a remote Cloud Service Provider (CSP) is a growing trend for numerous organizations alleviating the burden of local data storage and maintenance. While Cloud computing makes these advantages more appealing than ever, it also brings new challenging security threats towards user’s outsourced data. It’s of crucial importance to customers to have strong evidence that they actual...
متن کامل