[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kallahalla et al., 2003 - Google Patents

Plutus: Scalable secure file sharing on untrusted storage

Kallahalla et al., 2003

View HTML
Document ID
13231983951205344633
Author
Kallahalla M
Riedel E
Swaminathan R
Wang Q
Fu K
Publication year
Publication venue
2nd USENIX Conference on File and Storage Technologies (FAST 03)

External Links

Snippet

Plutus is a cryptographic storage system that enables secure file sharing without placing much trust on the file servers. In particular, it makes novel use of cryptographic primitives to protect and share files. Plutus features highly scalable key management while allowing …
Continue reading at www.usenix.org (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material

Similar Documents

Publication Publication Date Title
Kallahalla et al. Plutus: Scalable secure file sharing on untrusted storage
Harrington et al. Cryptographic access control in a distributed file system
Kher et al. Securing distributed storage: challenges, techniques, and systems
Fu Group sharing and random access in cryptographic storage file systems
Miller et al. Strong Security for {Network-Attached} Storage
US7401220B2 (en) On-disk file format for a serverless distributed file system
US7478243B2 (en) On-disk file format for serverless distributed file system with signed manifest of file modifications
Goh et al. SiRiUS: Securing Remote Untrusted Storage.
US8205090B2 (en) Secure recovery in a serverless distributed file system
EP1246061B1 (en) A serverless distributed file system
Miller et al. Strong security for distributed file systems
US7280956B2 (en) System, method, and computer program product for file encryption, decryption and transfer
Singh et al. Sharoes: A data sharing platform for outsourced enterprise storage environments
Leung et al. Scalable security for petascale parallel file systems
Zhu et al. SNARE: A strong security scheme for network-attached storage
Naor et al. Toward securing untrusted storage without public-key operations
Geron et al. CRUST: cryptographic remote untrusted storage without public keys
Olson et al. Secure capabilities for a petabyte-scale object-based distributed file system
Reed et al. Security considerations when designing a distributed file system using object storage devices
Kher et al. Decentralized authentication mechanisms for object-based storage devices
Sharma et al. Transcrypt: A secure and transparent encrypting file system for enterprises
O'Shanahan CryptosFS: Fast cryptographic secure NFS
Stanton et al. Protecting multimedia data in storage: A survey of techniques emphasizing encryption
Guo Mobile certifying cryptographic file system
Riedel et al. Paranoia vs. performance-a quantitative evaluation of storage system security