Tamper-resistant storage techniques for multimedia systems

被引:2
|
作者
Haubert, E [1 ]
Tucek, J [1 ]
Brumbaugh, L [1 ]
Yurcik, W [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
关键词
tamper-resistant; tamper-proof; storage; multimedia; authenticity; integrity; security; reliability;
D O I
10.1117/12.588020
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are: (1) authenticity guarantees, (2) integrity guarantees, (3) confidentiality guarantees, (4) performance overhead attributed to security, and (5) scalability concerns. Immutable storage techniques can enhance tamper-resistant techniques. Digital watermarking is not appropriate for tamper-resistance implemented in the storage system rather than at the application level.
引用
收藏
页码:30 / 40
页数:11
相关论文
共 50 条
  • [1] TAMPER-RESISTANT BUT NOT IMPOSSIBLE
    MCLEARN, D
    [J]. AMERICAN JOURNAL OF NURSING, 1985, 85 (03) : 244 - +
  • [2] Tamper-resistant biometric IDs
    Kirovski, D
    Jojic, N
    Jancke, G
    [J]. ISSE 2004 - SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 160 - 175
  • [3] Tamper-resistant cryptographic hardware
    Fujino, Takeshi
    Kubota, Takaya
    Shiozaki, Mitsuru
    [J]. IEICE ELECTRONICS EXPRESS, 2017, 14 (02): : 1 - 13
  • [4] TAMPER-RESISTANT PACKAGING - IS IT REALLY
    LOCKHART, HE
    RICHMOND, M
    SNEDEN, J
    [J]. PACKAGE ENGINEERING, 1983, 28 (07): : 96 - &
  • [5] Tamper-Resistant LikeJacking Protection
    Johns, Martin
    Lekies, Sebastian
    [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 265 - 285
  • [6] Reconfigurable Physical Unclonable Functions - Enabling Technology for Tamper-Resistant Storage
    Kursawe, Klaus
    Sadeghi, Ahmad-Reza
    Schellekens, Dries
    Skoric, Boris
    Tuyls, Pim
    [J]. 2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 22 - +
  • [7] Tamper-resistant whole program partitioning
    Zhang, T
    Pande, S
    Valverde, A
    [J]. ACM SIGPLAN NOTICES, 2003, 38 (07) : 209 - 219
  • [8] Tamper-resistant ubiquitous data management
    Bouganim, L
    Ngoc, FD
    Pucheral, P
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (02): : 147 - 158
  • [9] The Research of Website Tamper-resistant Technology
    Qi Tao
    Wang Bo
    Zhao Sujuan
    [J]. ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 475 - +
  • [10] License protection with a tamper-resistant token
    Chong, CN
    Ren, B
    Doumen, J
    Etalle, S
    Hartel, PH
    Corin, R
    [J]. INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 223 - 237