首页> 外文会议>Computer security-ESORICS 2008 >Remote Integrity Check with Dishonest Storage Server
【24h】

Remote Integrity Check with Dishonest Storage Server

机译:使用不诚实的存储服务器进行远程完整性检查

获取原文
获取原文并翻译 | 示例

摘要

We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server, by adapting the challenges and responses, tries to discard partial information of x and yet evades detection. Besides the security requirements, there are considerations on communication, storage size and computation time. Juels et al. gave a security model for Proof of Retrievability (POR) system. The model imposes a requirement that the original x can be recovered from multiple challenges-responses. Such requirement is not necessary in our problem. Hence, we propose an alternative security model for Remote Integrity Check (RIC). We study a few schemes and analyze their efficiency and security. In particular, we prove the security of a proposed scheme HENC. This scheme can be deployed as a POR system and it also serves as an example of an effective POR system whose "extraction" is not verifiable. We also propose a combination of the RSA-based scheme by Filho et al. and the ECC-based authenticator by Naor et al. which achieves good asymptotic performance. This scheme is not a POR system and seems to be a secure RIC. In-so-far, all schemes that have been proven secure can also be adopted as POR systems. This brings out the question of whether there are fundamental differences between the two models. To highlight the differences, we introduce a notion, trap-door compression, that captures a property on compressibility.
机译:我们对这个问题感兴趣:验证器的存储空间小且可靠,想定期检查远程服务器是否保存着大文件x。不诚实的服务器通过适应挑战和响应,尝试丢弃x的部分信息并逃避检测。除了安全要求外,还要考虑通信,存储大小和计算时间。 Juels等。给出了可恢复性证明(POR)系统的安全模型。该模型提出了一个要求,即可以从多个质询响应中恢复原始x。在我们的问题中,这种要求不是必需的。因此,我们提出了一种用于远程完整性检查(RIC)的替代安全模型。我们研究了一些方案,并分析了它们的效率和安全性。特别是,我们证明了所提方案HENC的安全性。此方案可以部署为POR系统,并且还可以用作其“提取”不可验证的有效POR系统的示例。我们还提出了Filho等人基于RSA的方案的组合。以及Naor等人基于ECC的身份验证器。实现了良好的渐近性能。该方案不是POR系统,似乎是安全的RIC。就目前而言,所有已证明是安全的方案也可以用作POR系统。这就提出了两个模型之间是否存在根本差异的问题。为了突出区别,我们引入了陷阱门压缩的概念,该概念捕获了可压缩性的属性。

著录项

  • 来源
    《Computer security-ESORICS 2008》|2008年|223-237|共15页
  • 会议地点 Malaga(ES);Malaga(ES)
  • 作者

    Ee-Chien Chang; Jia Xu;

  • 作者单位

    School of Computing National University of Singapore;

    School of Computing National University of Singapore;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 安全保密;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号