[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3052973.3053025acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

MoPS: A Modular Protection Scheme for Long-Term Storage

Published: 02 April 2017 Publication History

Abstract

Current trends in technology, such as cloud computing, allow outsourcing the storage, backup, and archiving of data. This provides efficiency and flexibility, but also poses new risks for data security. It in particular became crucial to develop protection schemes that ensure security even in the long-term, i.e. beyond the lifetime of keys, certificates, and cryptographic primitives. However, all current solutions fail to provide optimal performance for different application scenarios. Thus, in this work, we present MoPS, a modular protection scheme to ensure authenticity and integrity for data stored over long periods of time. MoPS does not come with any requirements regarding the storage architecture and can therefore be used together with existing archiving or storage systems. It supports a set of techniques which can be plugged together, combined, and migrated in order to create customized solutions that fulfill the requirements of different application scenarios in the best possible way. As a proof of concept we implemented MoPS and provide performance measurements. Furthermore, our implementation provides additional features, such as guidance for non-expert users and export functionalities for external verifiers.

References

[1]
D. Bayer, S. Haber, and W. S. Stornetta. Improving the Efficiency and Reliability of Digital Time-Stamping. In Sequences II: Methods in Communication, Security and Computer Science, pages 329--334, 1993.
[2]
A. J. Blazic, S. Saljic, and T. Gondrom. Extensible Markup Language Evidence Record Syntax (XMLERS), 2011.
[3]
ETSI. XML Advanced Electronic Signatures (XAdES). Number TS 101 903. 1.4.1 edition, 2009.
[4]
T. Gondrom, R. Brandner, and U. Pordesch. Evidence Record Syntax (ERS), 2007.
[5]
S. Haber and P. Kamat. A Content Integrity Service for Long-Term Digital Archives. In Archiving Conference, pages 159--164. Society for Imaging Science and Technology, 2006.
[6]
D. Lekkas and D. Gritzalis. Cumulative Notarization for Long-term Preservation of Digital Signatures. Computers & Security, 23:413--424, 2004.
[7]
A. K. Lenstra. Key lengths. In The Handbook of Information Security, volume 2, pages 617--635. 2006.
[8]
P. Maniatis and M. Baker. Secure History Preservation Through Timeline Entanglement. In USENIX Security '02, pages 297--312, 2002.
[9]
R. C. Merkle. A certified digital signature. In CRYPTO '89, pages 218--238.
[10]
M. Vigil, J. Buchmann, D. Cabarcas, C. Weinert, and A. Wiesmaier. Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey. Computers & Security, 50(0):16--32, 2015.
[11]
M. Vigil, D. Cabarcas, J. Buchmann, and J. Huang. Assessing Trust in the Long-Term Protection of Documents. In ISCC 2013, pages 185--191, 2013.
[12]
M. Vigil, C. Weinert, K. Braden, D. Demirel, and J. Buchmann. A Performance Analysis of Long-Term Archiving Techniques. In HPCC 2014, pages 878--889, 2014.
[13]
M. Vigil, C. Weinert, D. Demirel, and J. Buchmann. An Efficient Time-Stamping Solution for Long-Term Digital Archiving. In IPCCC 2014, 2014.

Cited By

View all
  • (2023)Novel Cutting‐Edge Security Tools for Medical and Genomic Data With Privacy Preservation TechniquesPrivacy Preservation of Genomic and Medical Data10.1002/9781394213726.ch5(113-129)Online publication date: 17-Nov-2023
  • (2020)ELSA: efficient long-term secure storage of large datasets (full version) ∗EURASIP Journal on Information Security10.1186/s13635-020-00108-92020:1Online publication date: 27-May-2020
  • (2019)Long-term integrity protection of genomic dataEURASIP Journal on Information Security10.1186/s13635-019-0099-x2019:1Online publication date: 29-Oct-2019
  • Show More Cited By

Index Terms

  1. MoPS: A Modular Protection Scheme for Long-Term Storage

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
    April 2017
    952 pages
    ISBN:9781450349444
    DOI:10.1145/3052973
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 April 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. authenticity
    2. cloud computing
    3. efficiency
    4. integrity
    5. long-term archiving
    6. long-term security

    Qualifiers

    • Research-article

    Conference

    ASIA CCS '17
    Sponsor:

    Acceptance Rates

    ASIA CCS '17 Paper Acceptance Rate 67 of 359 submissions, 19%;
    Overall Acceptance Rate 418 of 2,322 submissions, 18%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Novel Cutting‐Edge Security Tools for Medical and Genomic Data With Privacy Preservation TechniquesPrivacy Preservation of Genomic and Medical Data10.1002/9781394213726.ch5(113-129)Online publication date: 17-Nov-2023
    • (2020)ELSA: efficient long-term secure storage of large datasets (full version) ∗EURASIP Journal on Information Security10.1186/s13635-020-00108-92020:1Online publication date: 27-May-2020
    • (2019)Long-term integrity protection of genomic dataEURASIP Journal on Information Security10.1186/s13635-019-0099-x2019:1Online publication date: 29-Oct-2019
    • (2019)$$\mathsf {ELSA}$$: Efficient Long-Term Secure Storage of Large DatasetsInformation Security and Cryptology – ICISC 201810.1007/978-3-030-12146-4_17(269-286)Online publication date: 23-Jan-2019
    • (2017)CogniCrypt: supporting developers in using cryptographyProceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering10.5555/3155562.3155681(931-936)Online publication date: 30-Oct-2017
    • (2017)CogniCrypt: Supporting developers in using cryptography2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE)10.1109/ASE.2017.8115707(931-936)Online publication date: Oct-2017

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media