PROPYLA: Privacy Preserving Long-Term Secure Storage

被引:4
|
作者
Geihs, Matthias [1 ]
Karvelas, Nikolaos [1 ]
Katzenbeisser, Stefan [1 ]
Buchmann, Johannes [1 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
关键词
Secure storage; Long-term security; Integrity; Confidentiality; Privacy; Renewable cryptography; Information-theoretic cryptography; Oblivious RAM; Secret sharing; Timestamps; Commitments; COMMITMENTS;
D O I
10.1145/3201595.3201599
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The amount of electronically stored information increases rapidly. Sensitive information requires integrity and confidentiality protection, sometimes for decades or even centuries (e.g., health records or governmental documents). Commonly used cryptographic schemes, however, are not designed to provide protection over such long time periods. Their security usually relies on the hardness of a specific computational problem and security cannot be maintained against unforeseeable developments in computational technology (e.g., quantum computers breaking RSA-based systems). Recently, Braun et al. (AsiaCCS'17) proposed the first storage architecture that supports integrity protection renewal while guaranteeing information theoretic confidentiality. However, their solution only considers the storage of unstructured data and does not allow for reading or writing subparts of the data. Our contribution is the first long-term secure storage architecture that supports storage of structured databases and provides long-term integrity, confidentiality, and access pattern hiding security. To achieve this, we combine several cryptographic components (i.e., secret sharing, renewable timestamps, and renewable commitments) with an information-theoretically secure ORAM such that the described security properties are achieved. We also prove our construction secure and show that it only introduces a small overhead compared to standard secret sharing and ORAM based storage solutions.
引用
收藏
页码:39 / 48
页数:10
相关论文
共 50 条
  • [1] Secure Disintegration Protocol for Privacy Preserving Cloud Storage
    Rawal, Bharat S.
    Vijayakumar, V.
    Manogaran, Gunasekaran
    Varatharajan, R.
    Chilamkurti, Naveen
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 103 (02) : 1161 - 1177
  • [2] Secure Disintegration Protocol for Privacy Preserving Cloud Storage
    Bharat S. Rawal
    V. Vijayakumar
    Gunasekaran Manogaran
    R. Varatharajan
    Naveen Chilamkurti
    [J]. Wireless Personal Communications, 2018, 103 : 1161 - 1177
  • [3] POTSHARDS: Secure long-term storage without encryption
    Storer, Mark W.
    Greenan, Kevin M.
    Miller, Ethan L.
    Voruganti, Kaladhar
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 2007 USENIX ANNUAL TECHNICAL CONFERENCE, 2007, : 143 - 156
  • [4] Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wang, Cong
    Chow, Sherman S. M.
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 362 - 375
  • [5] Secure and privacy preserving keyword searching for cloud storage services
    Liu, Qin
    Wang, Guojun
    Wu, Jie
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 927 - 933
  • [6] ELSA: Efficient Long-Term Secure Storage of Large Datasets
    Geihs, Matthias
    Buchmann, Johannes
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 269 - 286
  • [7] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    Anbuchelian, S.
    Sowmya, C. M.
    Ramesh, C.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9767 - S9775
  • [8] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    S. Anbuchelian
    C. M. Sowmya
    C. Ramesh
    [J]. Cluster Computing, 2019, 22 : 9767 - 9775
  • [9] Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage
    Liu, Jia-Nan
    Luo, Xizhao
    Weng, Jian
    Yang, Anjia
    Wang, Xu An
    Li, Ming
    Lin, Xiaodong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1518 - 1531
  • [10] Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks
    Niu, Ben
    Chen, Yahong
    Wang, Zhibo
    li, Fenghua
    Wang, Boyang
    Li, Hui
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (01) : 125 - 138