A Revocable Backup System
نویسندگان
چکیده
We present a system which enables a user to remove a le from both the le system and all the backup tapes on which the le is stored. The ability to remove les from all backup tapes is desirable in many cases. Our system erases information from the backup tape without actually writing on the tape. This is achieved by applying cryptography in a new way: a block cipher is used to enable the system to \forget" information rather than protect it. Our system is easy to install and is transparent to the end user. Further, it introduces no slowdown in system performance and little slowdown in the backup procedure.
منابع مشابه
Protecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks
structured abstract Research paper Purpose To enhance security and privacy of e-cash systems that apply revocable anonymity by presenting a stochastic attack, that reveals the hidden ID, and suitable protection means against this kind of attacks. Methodology/Approach The feasibility of a stochastic attack that reveals the ID of user of e-cash schemes with revocable anonymity is shown. To avoid ...
متن کاملUpdate-tolerant and Revocable Password Backup (Extended Version)
It is practically impossible for users to memorize a large portfolio of strong and individual passwords for their online accounts. A solution is to generate passwords randomly and store them. Yet, storing passwords instead of memorizing them bears the risk of loss, e.g., in situations where the device on which the passwords are stored is damaged, lost, or stolen. This makes the creation of back...
متن کاملBlind Certification of Public Keys and Efficiently Revocable Cash: Secure Against Capable Attackers
Electronic cash should be revocable in order to nullify the effect of attacks mounted by a capable attacker (e.g., double spending by reverse-engineering tamper-resistant devices). For prudent engineering considerations, cash revocability forms a necessary complementary measure to using tamper-resistant devices, adding system security while lowering system cost by reducing the level of physical...
متن کاملA Proof-Carrying File System with Revocable and Use-Once Certificates
We present the design and implementation of a file system which allows authorizations dependent on revocable and use-once policy certificates. Authorizations require explicit proof objects, combining ideas from previous authorization logics and Girard’s linear logic. Useonce certificates and revocations lists are maintained in a database that is consulted during file access. Experimental result...
متن کاملContext-based Texture Analysis for Secure Revocable Iris-Biometric Key Generation
In this work we present an iris-biometric cryptosystem. Based on the idea of exploiting the most reliable components of iriscodes, cryptographic keys are extracted, long enough to be applied in common cryptosystems. The main benefit of our system is that cryptographic keys are directly derived from biometric data, thus, neither plain biometric data nor encrypted biometric data has to be stored ...
متن کامل