MoPS: A Modular Protection Scheme for Long-Term Storage

@article{Weinert2017MoPSAM,
  title={MoPS: A Modular Protection Scheme for Long-Term Storage},
  author={Christian Weinert and Denise Demirel and Mart{\'i}n A. Gagliotti Vigil and Matthias Geihs and Johannes A. Buchmann},
  journal={Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security},
  year={2017}
}
Current trends in technology, such as cloud computing, allow outsourcing the storage, backup, and archiving of data. This provides efficiency and flexibility, but also poses new risks for data security. It in particular became crucial to develop protection schemes that ensure security even in the long-term, i.e. beyond the lifetime of keys, certificates, and cryptographic primitives. However, all current solutions fail to provide optimal performance for different application scenarios. Thus, in… Expand
ELSA: efficient long-term secure storage of large datasets (full version) ∗
TLDR
This work constructed a renewable vector commitment scheme that is information-theoretically hiding under selective decommitment that requires only a single timestamp for protecting a dataset while the state of the art requires a number of timestamps linear in the number of data items, and extends this scheme to a multi-client setting. Expand
ELSA: Efficient Long-Term Secure Storage of Large Datasets
TLDR
This work constructs a renewable vector commitment scheme that is information-theoretically hiding under selective decommitment, and combines this scheme with renewable timestamps and information- theoretically secure secret sharing and presents a solution for efficient long-term integrity and confidentiality protection of large datasets consisting of relatively small data items. Expand
CogniCrypt - the secure integration of cryptographic software
TLDR
CoviCrypt integrates different kinds of tool support into a unified approach in order to lift the burden of needing to know how to use cryptographic APIs from the developer, and devised CogniCryptgen, a code generator that proactively assists developers in using Java cryptographic APIs correctly. Expand
CogniCrypt: Supporting developers in using cryptography
TLDR
CogniCrypt is a tool that supports developers with the use of cryptographic APIs and generates code that implements the respective task in a secure manner for a number of common cryptographic tasks. Expand
Long-term integrity protection of genomic data
TLDR
A protection scheme is described that preserves integrity of the genomic data in that scenario over a time horizon of 100 years, which shows that privacy-preserving long-term integrity protection of genomic data is resource demanding, but in reach of current and future hardware technology and has negligible costs of storage. Expand

References

SHOWING 1-10 OF 21 REFERENCES
A Performance Analysis of Long-Term Archiving Techniques
  • M. Vigil, Christian Weinert, K. Braden, D. Demirel, J. Buchmann
  • Computer Science
  • 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS)
  • 2014
TLDR
An analytical analysis of the performance of several proposals for long-term archiving of digital archives, finding the most promising schemes and compared them with respect to their required storage space and verification time. Expand
A Content Integrity Service For Long-Term Digital Archives
TLDR
An efficient and secure Content Integrity Service (CIS) that solves this problem, which is designed and implemented as a service on the Digital Media Platform (DMP) and relies on one-way hashing and digital time-stamping procedures. Expand
Cumulative notarization for long-term preservation of digital signatures
TLDR
A mechanism for cumulative data notarization that results in a successive trust transition towards new entities, modern technologies, and refreshed data is proposed that will eliminate any dependency on ceased entities, obsolete data, and weak old technologies. Expand
An efficient time-stamping solution for long-term digital archiving
TLDR
An improved version of CIS named Content Integrity Service with Skip Lists (CISS) is introduced that changes the time-stamping process of CIS by using two different types of time-Stamps together with skip lists. Expand
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey
TLDR
This paper surveys the solutions that provide the above protection goals in the long term and deduces deficiencies of the current solutions and important research problems that must be solved in order to come up with protection solutions that are even more satisfactory. Expand
Secure History Preservation Through Timeline Entanglement
TLDR
The design and implementation of Timeweave is presented, the authors' service development framework for timeline entanglement based on two novel disk-based authenticated data structures, and it is shown that it can be deployed in a loosely-coupled distributed system of several hundred nodes with overhead of roughly 2-8% of the processing resources of a PC-grade system. Expand
Improving the Efficiency and Reliability of Digital Time-Stamping
TLDR
Two schemes for digital time-stamping which rely on Cryptographic hash functions, which can be used both to report events succinctly, and to cause events based on documents without revealing their contents are proposed. Expand
Assessing trust in the long-term protection of documents
TLDR
This paper presents a certification scheme for documents that provides verifiers with a better assessment of trust than in X.509 PKI, and encourages trusted parties to work properly. Expand
Evidence Record Syntax (ERS)
TLDR
This document specifies the syntax and processing of an Evidence Record, a structure designed to support long-term non-repudiation of existence of data. Expand
A Certified Digital Signature
TLDR
A practical digital signature system based on a conventionalryption function which is as secure as the conventional encryption function is described, without the several years delay required for certification of an untested system. Expand
...
1
2
3
...