Sciweavers

Share
OSDI
2000
ACM

How to Build a Trusted Database System on Untrusted Storage

11 years 2 months ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, TDB, which leverages a small amount of trusted storage to protect a scalable amount of untrusted storage. The database is encrypted and validated against a collision-resistant hash kept in trusted storage, so untrusted programs cannot read the database or modify it undetectably. TDB integrates encryption and hashing with a low-level data model, which protects data and metadata uniformly, unlike systems built on top of a conventional database system. The implementation exploits synergies between hashing and log-structured storage. Preliminary performance results show that TDB outperforms an off-the-shelf embedded database system, thus supporting the suitability of the TDB architecture.
Umesh Maheshwari, Radek Vingralek, William Shapiro
Added 01 Nov 2010
Updated 01 Nov 2010
Type Conference
Year 2000
Where OSDI
Authors Umesh Maheshwari, Radek Vingralek, William Shapiro
Comments (0)
books