File system design with assured delete
R Perlman - Third IEEE International Security in Storage …, 2005 - ieeexplore.ieee.org
This paper describes a system that supports high availability of data, until the data should be
expunged, at which time the system makes it impossible to recover the data. This design …
expunged, at which time the system makes it impossible to recover the data. This design …
Securing distributed storage: challenges, techniques, and systems
V Kher, Y Kim - Proceedings of the 2005 ACM workshop on Storage …, 2005 - dl.acm.org
The rapid increase of sensitive data and the growing number of government regulations that
require longterm data retention and protection have forced enterprises to pay serious …
require longterm data retention and protection have forced enterprises to pay serious …
Improved proxy re-encryption schemes with applications to secure distributed storage
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called atomic proxy re-
encryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for …
encryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for …
[HTML][HTML] Plutus: Scalable secure file sharing on untrusted storage
M Kallahalla, E Riedel, R Swaminathan… - … USENIX Conference on …, 2003 - usenix.org
Plutus is a cryptographic storage system that enables secure file sharing without placing
much trust on the file servers. In particular, it makes novel use of cryptographic primitives to …
much trust on the file servers. In particular, it makes novel use of cryptographic primitives to …
Patient controlled encryption: ensuring privacy of electronic medical records
We explore the challenge of preserving patients' privacy in electronic health record systems.
We argue that security in such systems should be enforced via encryption as well as access …
We argue that security in such systems should be enforced via encryption as well as access …
[PDF][PDF] SiRiUS: Securing Remote Untrusted Storage.
This paper presents SiRiUS, a secure file system designed to be layered over insecure
network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase …
network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase …
[PDF][PDF] Secure Untrusted Data Repository (SUNDR).
J Li, MN Krohn, D Mazieres, DE Shasha - Osdi, 2004 - usenix.org
SUNDR is a network file system designed to store data securely on untrusted servers.
SUNDR lets clients detect any attempts at unauthorized file modification by malicious server …
SUNDR lets clients detect any attempts at unauthorized file modification by malicious server …
[PDF][PDF] Enabling security in cloud storage {SLAs} with {CloudProof}
Several cloud storage systems exist today, but none of them provide security guarantees in
their Service Level Agreements (SLAs). This lack of security support has been a major …
their Service Level Agreements (SLAs). This lack of security support has been a major …
Iris: A scalable cloud file system with efficient integrity checks
We present Iris, a practical, authenticated file system designed to support workloads from
large enterprises storing data in the cloud and be resilient against potentially untrustworthy …
large enterprises storing data in the cloud and be resilient against potentially untrustworthy …
{DORY}: An encrypted search system with distributed trust
E Dauterman, E Feng, E Luo, RA Popa… - 14th USENIX Symposium …, 2020 - usenix.org
Efficient, leakage-free search on encrypted data has remained an unsolved problem for the
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …