Efficient Integrity Checking of Untrusted Network Storage

TitleEfficient Integrity Checking of Untrusted Network Storage
Publication TypeConference Papers
Year of Publication2008
AuthorsHeitzmann A, Palazzi B, Papamanthou C, Tamassia R
Conference NameStorageSS '08 Proceedings of the 4th ACM International Workshop on Storage Security and Survivability
Date Published2008///
PublisherACM
ISBN Number978-1-60558-299-3
Keywordsauthenticated data structures, data integrity, Security, untrusted outsourced storage
Abstract

Outsourced storage has become more and more practical in recent years. Users can now store large amounts of data in multiple servers at a relatively low price. An important issue for outsourced storage systems is to design an efficient scheme to assure users that their data stored at remote servers has not been tampered with. This paper presents a general method and a practical prototype application for verifying the integrity of files in an untrusted network storage service. The verification process is managed by an application running in a trusted environment (typically on the client) that stores just one cryptographic hash value of constant size, corresponding to the "digest" of an authenticated data structure. The proposed integrity verification service can work with any storage service since it is transparent to the storage technology used. Experimental results show that our integrity verification method is efficient and practical for network storage systems.

URLhttp://doi.acm.org/10.1145/1456469.1456479