Sciweavers

Share
STORAGESS
2005
ACM

Toward securing untrusted storage without public-key operations

12 years 9 days ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, widely used in such file systems, are known to have worse performance than their symmetric key counterparts. In this paper we examine design alternatives that avoid public-key cryptography operations to achieve better performance. We present the trade-offs and limitations that are introduced by these substitutions. Categories and Subject Descriptors D.4.6 [Operating Systems]: Security and Protection— Access controls, Authentication; E.3 [Data Encryption]: Public key cryptosystems General Terms Security Keywords secure file systems, network attached storage
Dalit Naor, Amir Shenhav, Avishai Wool
Added 26 Jun 2010
Updated 26 Jun 2010
Type Conference
Year 2005
Where STORAGESS
Authors Dalit Naor, Amir Shenhav, Avishai Wool
Comments (0)
books