Sensor networks have been an attractive platform for pervasive computing and communication. However, they are vulnerable to attacks if deployed in hostile environments. The past research of sensor network security has focused on securing information in communication, but how to secure information in
Secure distributed storage and retrieval
β Scribed by Juan A. Garay; Rosario Gennaro; Charanjit Jutla; Tal Rabin
- Publisher
- Elsevier Science
- Year
- 2000
- Tongue
- English
- Weight
- 167 KB
- Volume
- 243
- Category
- Article
- ISSN
- 0304-3975
No coin nor oath required. For personal study only.
β¦ Synopsis
In his well-known Information Dispersal Algorithm paper, Rabin showed a way to distribute information in n pieces among n servers in such a way that recovery of the information is possible in the presence of up to t inactive servers. An enhanced mechanism to enable construction in the presence of malicious faults, which can intentionally modify their pieces of the information, was later presented by Krawczyk. Yet, these methods assume that the malicious faults occur only at reconstruction time.
In this paper we address the more general problem of secure storage and retrieval of information (SSRI), and guarantee that also the process of storing the information is correct even when some of the servers fail. Our protocols achieve this while maintaining the (asymptotical) space optimality of the above methods.
We also consider SSRI with the added requirement of conΓΏdentiality, by which no party except for the rightful owner of the information is able to learn anything about it. This is achieved through novel applications of cryptographic techniques, such as the distributed generation of receipts, distributed key management via threshold cryptography, and "blinding".
An interesting byproduct of our scheme is the construction of a secret sharing scheme with shorter shares size in the amortized sense. An immediate practical application of our work is a system for the secure deposit of sensitive data. We also extend SSRI to a "proactive" setting, where an adversary may corrupt all the servers during the lifetime of the system, but only a fraction during any given time interval.
π SIMILAR VOLUMES
Laboratory sample storage and retrieval is a timeconsuming necessity/problem for many clinical and pharmaceutical laboratories, especially when samples must be stored at β«02Χβ¬ or β«07Χβ¬ΠC. In many cases, the volume of samples to be stored and the records to be kept become difficult and frequently imp