Team for Research in
Ubiquitous Secure Technology

.Efficiently Binding Data to Owners in Distributed Content-Addressable Storage Systems
Patrick Eaton, Hakim Weatherspoon, John Kubiatowicz

Citation
Patrick Eaton, Hakim Weatherspoon, John Kubiatowicz. ".Efficiently Binding Data to Owners in Distributed Content-Addressable Storage Systems". 3rd International IEEE Security in Storage Workshop, December, 2005.

Abstract
Distributed content-addressable storage systems use self-verifying data to protect data integrity and to enable graceful scaling. One feature commonly missing from these systems, however, is the ability to identify the owner of a piece of data in a non-repudiable manner. While a solution that associates a certificate with each block of data is conceptually simple, researchers have traditionally claimed that the cost of creating and maintaining certificates is too great. In this paper, we demonstrate that systems can, in fact, efficiently map data to its owner in a secure and nonrepudiable fashion. To reduce the cost of creating and maintaining certificates, we extend the traditional contentaddressable interface to allow the aggregation of many small data blocks into larger containers. The aggregation is performed in a way that also supports self-verifying data at the granularity of the block and container, fine-granularity access, and incremental updates. We describe two prototype implementations and present preliminary performance results from deployments on PlanetLab and a local cluster.

Electronic downloads

Citation formats  
  • HTML
    Patrick Eaton, Hakim Weatherspoon, John Kubiatowicz. <a
    href="http://www.truststc.org/pubs/623.html"
    >.Efficiently Binding Data to Owners in Distributed
    Content-Addressable Storage Systems</a>, 3rd
    International IEEE Security in Storage Workshop, December,
    2005.
  • Plain text
    Patrick Eaton, Hakim Weatherspoon, John Kubiatowicz.
    ".Efficiently Binding Data to Owners in Distributed
    Content-Addressable Storage Systems". 3rd International
    IEEE Security in Storage Workshop, December, 2005.
  • BibTeX
    @inproceedings{EatonWeatherspoonKubiatowicz05_EfficientlyBindingDataToOwnersInDistributedContentAddressable,
        author = {Patrick Eaton and Hakim Weatherspoon and John
                  Kubiatowicz},
        title = {.Efficiently Binding Data to Owners in Distributed
                  Content-Addressable Storage Systems},
        booktitle = {3rd International IEEE Security in Storage Workshop},
        month = {December},
        year = {2005},
        abstract = {Distributed content-addressable storage systems
                  use self-verifying data to protect data integrity
                  and to enable graceful scaling. One feature
                  commonly missing from these systems, however, is
                  the ability to identify the owner of a piece of
                  data in a non-repudiable manner. While a solution
                  that associates a certificate with each block of
                  data is conceptually simple, researchers have
                  traditionally claimed that the cost of creating
                  and maintaining certificates is too great. In this
                  paper, we demonstrate that systems can, in fact,
                  efficiently map data to its owner in a secure and
                  nonrepudiable fashion. To reduce the cost of
                  creating and maintaining certificates, we extend
                  the traditional contentaddressable interface to
                  allow the aggregation of many small data blocks
                  into larger containers. The aggregation is
                  performed in a way that also supports
                  self-verifying data at the granularity of the
                  block and container, fine-granularity access, and
                  incremental updates. We describe two prototype
                  implementations and present preliminary
                  performance results from deployments on PlanetLab
                  and a local cluster.},
        URL = {http://www.truststc.org/pubs/623.html}
    }
    

Posted by Jessica Gamble on 18 Mar 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.