CATS: Certified Authenticated Tamper-evident State Store for Network Services
نویسنده
چکیده
This paper presents the design, implementation, and evaluation of CATS, a toolkit for indexed state storage for network services. CATS is based on a new implementation of a persistent authenticated dictionary, which integrates signed action records and cryptographic state digests into an index. This storage abstraction enables a CATS-based network service to certify its operations: any client with sufficient knowledge of the service semantics can verify that it behaves consistently and correctly. CATS is a fundamental building block for accountable network systems that can detect, isolate, and prove misbehavior or tampering. The paper defines properties for accountable services, presents the state-based approach to accountability, and explores the design alternatives for the state storage layer. Novel aspects of the CATS design include the use of probabilistic audits to address the problem of replayed writes common to previous approaches. Experimental results illustrate the access and update costs for authenticated data structures based on the current state of the art.
منابع مشابه
Tamper-Evident Complex Genomic Networks
Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between indivi...
متن کاملThe aegis Processor Architecture for Tamper-Evident and Tamper-Resistant Processing
We describe the architecture of the aegis processor which can be used to build computing systems secure against both physical and software attacks. aegis assumes that the operating system and all components external to it, such as memory, are untrusted. aegis provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be dete...
متن کاملEfficient Data Structures For Tamper-Evident Logging
Many real-world applications wish to collect tamperevident logs for forensic purposes. This paper considers the case of an untrusted logger, serving a number of clients who wish to store their events in the log, and kept honest by a number of auditors who will challenge the logger to prove its correct behavior. We propose semantics of tamper-evident logs in terms of this auditing process. The l...
متن کاملSelf authentication path insertion in FPGA-based design flow for tamper-resistant purpose
FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...
متن کاملEfficient Architectural Support for Secure Bus-Based Shared Memory Multiprocessor
Tamper-evident and tamper-resistant systems are vital to support applications such as digital right management and certified grid computing. Recently proposed schemes, such as XOM and AEGIS, assume trusting processor state only to build secure systems. Secure execution for shared memory multiprocessor is a challenging problem as multiple devices need to be trusted. In this work, we propose a fr...
متن کامل