메뉴 건너뛰기




Volumn , Issue , 2009, Pages 187-198

HAIL: A high-availability and integrity layer for cloud storage

Author keywords

Cloud storage; Data availability; Distributed storage systems; Erasure codes; Proofs of retrievability

Indexed keywords

CRYPTOGRAPHIC SYSTEMS; DATA AVAILABILITY; DISTRIBUTED STORAGE SYSTEM; ERASURE CODES; FILE SHARE; FILE SIZES; HIGH AVAILABILITY; MOBILE ADVERSARY; PARAMETER CHOICE; PROTOTYPE IMPLEMENTATIONS; RIGOROUS ANALYSIS;

EID: 74049144464     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653686     Document Type: Conference Paper
Times cited : (611)

References (35)
  • 1
    • 74049161040 scopus 로고    scopus 로고
    • Amazon.com. Amazon simple storage service (Amazon S3), 2009. Referenced 2009 at aws.amazon.com/s3.
    • Amazon.com. Amazon simple storage service (Amazon S3), 2009. Referenced 2009 at aws.amazon.com/s3.
  • 4
    • 84957068240 scopus 로고    scopus 로고
    • UMAC: Fast and secure message authentication
    • CRYPTO, of
    • J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure message authentication. In CRYPTO, volume 1666 of LNCS, pages 216-233, 1999.
    • (1999) LNCS , vol.1666 , pp. 216-233
    • Black, J.1    Halevi, S.2    Krawczyk, H.3    Krovetz, T.4    Rogaway, P.5
  • 7
    • 0038687710 scopus 로고    scopus 로고
    • Asynchronous verifiable secret sharing and proactive cryptosystems
    • C. Cachin, K. Kursawe, A. Lysyanskaya, and R. Strobl. Asynchronous verifiable secret sharing and proactive cryptosystems. In 9th ACM CCS, pages 88-97, 2002.
    • (2002) 9th ACM CCS , pp. 88-97
    • Cachin, C.1    Kursawe, K.2    Lysyanskaya, A.3    Strobl, R.4
  • 8
    • 33749418149 scopus 로고    scopus 로고
    • Asynchronous verifiable information dispersal
    • C. Cachin and S. Tessaro. Asynchronous verifiable information dispersal. In 24th IEEE SRDS, pages 191-202, 2005.
    • (2005) 24th IEEE SRDS , pp. 191-202
    • Cachin, C.1    Tessaro, S.2
  • 11
    • 51849117195 scopus 로고    scopus 로고
    • MR-PDP: Multiple-replica provable data possession
    • R. Curtmola, O. Khan, R. Burns, and G. Ateniese. MR-PDP: Multiple-replica provable data possession. In 28th IEEE ICDCS, pages 411-420, 2008.
    • (2008) 28th IEEE ICDCS , pp. 411-420
    • Curtmola, R.1    Khan, O.2    Burns, R.3    Ateniese, G.4
  • 12
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification
    • 6th IACR TCC, of
    • Y. Dodis, S. Vadhan, and D. Wichs. Proofs of retrievability via hardness amplification. In 6th IACR TCC, volume 5444 of LNCS, pages 109-127, 2009.
    • (2009) LNCS , vol.5444 , pp. 109-127
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 14
    • 84942512232 scopus 로고    scopus 로고
    • SQUARE HASH: Fast message authentication via optimized universal hash functions
    • CRYPTO, of
    • M. Etzel, S. Patel, and Z. Ramzan. SQUARE HASH: Fast message authentication via optimized universal hash functions. In CRYPTO, volume 1666 of LNCS, pages 234-251, 1999.
    • (1999) LNCS , vol.1666 , pp. 234-251
    • Etzel, M.1    Patel, S.2    Ramzan, Z.3
  • 15
    • 74049115688 scopus 로고    scopus 로고
    • D.L.G. Filho and P.S.L.M. Barreto. Demonstrating data possession and uncheatable data transfer, 2006. IACR eArchive 2006/150.
    • D.L.G. Filho and P.S.L.M. Barreto. Demonstrating data possession and uncheatable data transfer, 2006. IACR eArchive 2006/150.
  • 18
    • 74049094179 scopus 로고    scopus 로고
    • P. Gopalan, R.J. Lipton, and Y.Z. Ding. Error correction against computationally bounded adversaries, 2004. Manuscript.
    • P. Gopalan, R.J. Lipton, and Y.Z. Ding. Error correction against computationally bounded adversaries, 2004. Manuscript.
  • 19
    • 84942522751 scopus 로고    scopus 로고
    • MMH: Software message authentication in the Gbit/second rates
    • Fast Software Encryption, of
    • S. Halevi and H. Krawczyk. MMH: Software message authentication in the Gbit/second rates. In Fast Software Encryption, volume 1267 of LNCS, pages 172-189, 1997.
    • (1997) LNCS , vol.1267 , pp. 172-189
    • Halevi, S.1    Krawczyk, H.2
  • 20
    • 36849036863 scopus 로고    scopus 로고
    • Verifying distributed erasure-coded data
    • J. Hendricks, G. R. Ganger, and M. K. Reiter. Verifying distributed erasure-coded data. In 26th ACM PODC, pages 139-146, 2007.
    • (2007) 26th ACM PODC , pp. 139-146
    • Hendricks, J.1    Ganger, G.R.2    Reiter, M.K.3
  • 22
    • 84957626176 scopus 로고
    • Proactive secret sharing, or: How to cope with perpetual leakage
    • CRYPTO, of
    • A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing, or: How to cope with perpetual leakage. In CRYPTO, volume 1963 of LNCS, pages 339-352, 1995.
    • (1995) LNCS , vol.1963 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 23
    • 74049103479 scopus 로고    scopus 로고
    • PORs: Proofs of retrievability for large files
    • A. Juels and B. Kaliski. PORs: Proofs of retrievability for large files. In 14th ACM CCS, pages 584-597, 2007.
    • (2007) 14th ACM CCS , pp. 584-597
    • Juels, A.1    Kaliski, B.2
  • 24
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • CRYPTO, of
    • H. Krawczyk. LFSR-based hashing and authentication. In CRYPTO, volume 839 of LNCS, pages 129-139, 1994.
    • (1994) LNCS , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 26
    • 24144474940 scopus 로고    scopus 로고
    • S. Micali, C. Peikert, M. Sudan, and D. Wilson. Optimal error correction against computationally bounded noise. In TCC, pages 1-16.
    • S. Micali, C. Peikert, M. Sudan, and D. Wilson. Optimal error correction against computationally bounded noise. In TCC, pages 1-16.
  • 27
    • 33748605569 scopus 로고    scopus 로고
    • The complexity of online memory checking
    • M. Naor and G. N. Rothblum. The complexity of online memory checking. In 46th IEEE FOCS, pages 573-584, 2005.
    • (2005) 46th IEEE FOCS , pp. 573-584
    • Naor, M.1    Rothblum, G.N.2
  • 28
    • 84957663269 scopus 로고    scopus 로고
    • Software performance of universal hash functions
    • EUROCRYPT, of
    • W. Nevelsteen and B. Preneel. Software performance of universal hash functions. In EUROCRYPT, volume 1233 of LNCS, pages 24-41, 1997.
    • (1997) LNCS , vol.1233 , pp. 24-41
    • Nevelsteen, W.1    Preneel, B.2
  • 29
    • 85077327800 scopus 로고    scopus 로고
    • A performance evaluation and examination of open-source erasure coding libraries for storage
    • J. S. Plank, J. Luo, C. D. Schuman, L. Xu, and Z. W. O'Hearn. A performance evaluation and examination of open-source erasure coding libraries for storage. In 7th USENIX FAST, pages 253-265, 2009.
    • (2009) 7th USENIX FAST , pp. 253-265
    • Plank, J.S.1    Luo, J.2    Schuman, C.D.3    Xu, L.4    O'Hearn, Z.W.5
  • 30
    • 84957645558 scopus 로고
    • Bucket hashing and its application to fast message authentication
    • CRYPTO, of
    • P. Rogaway. Bucket hashing and its application to fast message authentication. In CRYPTO, volume 963 of LNCS, pages 29-42, 1995.
    • (1995) LNCS , vol.963 , pp. 29-42
    • Rogaway, P.1
  • 31
    • 33947694320 scopus 로고    scopus 로고
    • Store, forget, and check: Using algebraic signatures to check remotely administered storage
    • T. J. E. Schwarz and E. L. Miller. Store, forget, and check: Using algebraic signatures to check remotely administered storage. In 26th IEEE ICDCS, page 12, 2006.
    • (2006) 26th IEEE ICDCS , pp. 12
    • Schwarz, T.J.E.1    Miller, E.L.2
  • 32
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • ASIACRYPT, of
    • H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT, volume 5350 of LNCS, pages 90-107, 2008.
    • (2008) LNCS , vol.5350 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 34
    • 84942520895 scopus 로고    scopus 로고
    • On fast and provably secure message authentication based on universal hashing
    • CRYPTO, of
    • V. Shoup. On fast and provably secure message authentication based on universal hashing. In CRYPTO, volume 1109 of LNCS, pages 313-328, 1996.
    • (1996) LNCS , vol.1109 , pp. 313-328
    • Shoup, V.1
  • 35
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. Wegman and L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciencies, 22(3):265-279, 1981.
    • (1981) Journal of Computer and System Sciencies , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.1    Carter, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.