TY - GEN
T1 - Athos
T2 - 11th International Conference on Information Security, ISC 2008
AU - Goodrich, Michael T.
AU - Papamanthou, Charalampos
AU - Tamassia, Roberto
AU - Triandopoulos, Nikos
PY - 2008
Y1 - 2008
N2 - We study the problem of authenticated storage, where we wish to construct protocols that allow to outsource any complex file system to an untrusted server and yet ensure the file-system's integrity. We introduce Athos, a new, platform-independent and user-transparent architecture for authenticated outsourced storage. Using light-weight cryptographic primitives and efficient data-structuring techniques, we design authentication schemes that allow a client to efficiently verify that the file system is fully consistent with the exact history of updates and queries requested by the client. In Athos, file-system operations are verified in time that is logarithmic in the size of the file system using optimal storage complexity-constant storage overhead at the client and asymptotically no extra overhead at the server. We provide a prototype implementation of Athos validating its performance and its authentication capabilities.
AB - We study the problem of authenticated storage, where we wish to construct protocols that allow to outsource any complex file system to an untrusted server and yet ensure the file-system's integrity. We introduce Athos, a new, platform-independent and user-transparent architecture for authenticated outsourced storage. Using light-weight cryptographic primitives and efficient data-structuring techniques, we design authentication schemes that allow a client to efficiently verify that the file system is fully consistent with the exact history of updates and queries requested by the client. In Athos, file-system operations are verified in time that is logarithmic in the size of the file system using optimal storage complexity-constant storage overhead at the client and asymptotically no extra overhead at the server. We provide a prototype implementation of Athos validating its performance and its authentication capabilities.
UR - http://www.scopus.com/inward/record.url?scp=56649103630&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=56649103630&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-85886-7_6
DO - 10.1007/978-3-540-85886-7_6
M3 - Conference contribution
AN - SCOPUS:56649103630
SN - 3540858849
SN - 9783540858843
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 80
EP - 96
BT - Information Security - 11th International Conference, ISC 2008, Proceedings
Y2 - 15 September 2008 through 18 September 2008
ER -