Kallahalla et al., 2003 - Google Patents
Plutus: Scalable secure file sharing on untrusted storageKallahalla et al., 2003
View HTML- Document ID
- 13231983951205344633
- Author
- Kallahalla M
- Riedel E
- Swaminathan R
- Wang Q
- Fu K
- Publication year
- Publication venue
- 2nd USENIX Conference on File and Storage Technologies (FAST 03)
External Links
Snippet
Plutus is a cryptographic storage system that enables secure file sharing without placing much trust on the file servers. In particular, it makes novel use of cryptographic primitives to protect and share files. Plutus features highly scalable key management while allowing …
- 238000003860 storage 0 title abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kallahalla et al. | Plutus: Scalable secure file sharing on untrusted storage | |
Harrington et al. | Cryptographic access control in a distributed file system | |
Kher et al. | Securing distributed storage: challenges, techniques, and systems | |
Fu | Group sharing and random access in cryptographic storage file systems | |
Miller et al. | Strong Security for {Network-Attached} Storage | |
US7401220B2 (en) | On-disk file format for a serverless distributed file system | |
US7478243B2 (en) | On-disk file format for serverless distributed file system with signed manifest of file modifications | |
Goh et al. | SiRiUS: Securing Remote Untrusted Storage. | |
US8205090B2 (en) | Secure recovery in a serverless distributed file system | |
EP1246061B1 (en) | A serverless distributed file system | |
Miller et al. | Strong security for distributed file systems | |
US7280956B2 (en) | System, method, and computer program product for file encryption, decryption and transfer | |
Singh et al. | Sharoes: A data sharing platform for outsourced enterprise storage environments | |
Leung et al. | Scalable security for petascale parallel file systems | |
Zhu et al. | SNARE: A strong security scheme for network-attached storage | |
Naor et al. | Toward securing untrusted storage without public-key operations | |
Geron et al. | CRUST: cryptographic remote untrusted storage without public keys | |
Olson et al. | Secure capabilities for a petabyte-scale object-based distributed file system | |
Reed et al. | Security considerations when designing a distributed file system using object storage devices | |
Kher et al. | Decentralized authentication mechanisms for object-based storage devices | |
Sharma et al. | Transcrypt: A secure and transparent encrypting file system for enterprises | |
O'Shanahan | CryptosFS: Fast cryptographic secure NFS | |
Stanton et al. | Protecting multimedia data in storage: A survey of techniques emphasizing encryption | |
Guo | Mobile certifying cryptographic file system | |
Riedel et al. | Paranoia vs. performance-a quantitative evaluation of storage system security |