首页> 外文学位 >Efficient tamper-evident data structures for untrusted servers.
【24h】

Efficient tamper-evident data structures for untrusted servers.

机译:适用于不受信任服务器的高效防篡改数据结构。

获取原文
获取原文并翻译 | 示例

摘要

Many real-world applications run on untrusted servers or are run on servers that are subject to strong insider attacks. Although we cannot prevent an untrusted server from modifying or deleting data, with tamper-evident data structures, we can discover when this has occurred. If an untrusted server knows that a particular reply will not be checked for correctness, it is free to lie. Auditing for correctness is thus a frequent but overlooked operation. In my thesis, I present and evaluate new efficient data structures for tamper-evident logging and tamper-evident storage of changing data on untrusted servers, focussing on the costs of the entire system.;The first data structure is a new tamper-evident log design. I propose new semantics of tamper-evident logs in terms of the auditing process, required to detect misbehavior. To accomplish efficient auditing, I describe and benchmark a new tree-based data structure that can generate such proofs with logarithmic size and space, significantly improving over previous linear constructions while also offering a flexible query mechanism with authenticated results.;The remaining data structures are designs for a persistent authenticated dictionary (PAD) that allows users to send lookup requests to an untrusted server and get authenticated answers, signed by a trusted author, for both the current and historical versions of the dataset. Improving on prior constructions that require logarithmic storage and time, I present new classes of efficient PAD algorithms offering constant-sized authenticated answers or constant storage per update. I implement 21 different versions of PAD algorithms and perform a comprehensive evaluation using contemporary cloud-computing prices for computing and bandwidth to determine the most monetarily cost-effective designs.
机译:许多实际应用程序都在不受信任的服务器上运行,或者在遭受强大的内部攻击的服务器上运行。尽管我们无法防止不信任的服务器使用篡改数据结构来修改或删除数据,但我们可以发现何时发生。如果不受信任的服务器知道将不检查特定答复的正确性,则可以随意说谎。因此,对正确性进行审核是经常但被忽视的操作。在我的论文中,我提出并评估了新的高效数据结构,用于在不受信任的服务器上进行篡改记录和篡改记录存储更改数据,着重于整个系统的成本。第一个数据结构是新的篡改记录日志设计。我根据审计过程提出了篡改证据日志的新语义,这是检测不良行为所必需的。为了完成有效的审计,我描述了一个新的基于树的数据结构并对其进行了基准测试,该结构可以生成具有对数大小和空间的证明,与以前的线性结构相比有了显着改进,同时还提供了具有经过验证的结果的灵活查询机制。针对持久性认证字典(PAD)进行的设计,允许用户将查找请求发送到不受信任的服务器,并获取由可信作者签名的,针对数据集当前和历史版本的认证答案。在对需要对数存储和时间的现有构造进行改进的基础上,我介绍了新型的高效PAD算法,这些算法可提供恒定大小的经过验证的答案或每次更新均恒定存储。我实现了21种不同版本的PAD算法,并使用现代云计算的计算价格和带宽进行了全面评估,以确定最经济有效的设计。

著录项

  • 作者

    Crosby, Scott Alexander.;

  • 作者单位

    Rice University.;

  • 授予单位 Rice University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2010
  • 页码 144 p.
  • 总页数 144
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:36:49

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号