usenix conference policies
You are here
Integrity Checking in Cryptographic File Systems with Constant Trusted Storage
In this paper we propose two new constructions for protecting the integrity of files in cryptographic file systems. Our constructions are designed to exploit two characteristics of many file-system workloads, namely low entropy of file contents and high sequentiality of file block writes. At the same time, our approaches maintain the best features of the most commonly used algorithm today (Merkle trees), including defense against replay of stale (previously overwritten) blocks and a small, constant amount of trusted storage per file. Via implementations in the EncFS cryptographic file system, we evaluate the performance and storage requirements of our new constructions compared to those of Merkle trees. We conclude with guidelines for choosing the best integrity algorithm depending on typical application workload.
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
author = {Alina Oprea and Michael K. Reiter},
title = {Integrity Checking in Cryptographic File Systems with Constant Trusted Storage},
booktitle = {16th USENIX Security Symposium (USENIX Security 07)},
year = {2007},
address = {Boston, MA },
url = {https://www.usenix.org/conference/16th-usenix-security-symposium/integrity-checking-cryptographic-file-systems-constant},
publisher = {USENIX Association},
month = aug
}
connect with us