TY - CONF T1 - Efficient Integrity Checking of Untrusted Network Storage T2 - StorageSS '08 Proceedings of the 4th ACM International Workshop on Storage Security and Survivability Y1 - 2008 A1 - Heitzmann, Alexander A1 - Palazzi, Bernardo A1 - Charalampos Papamanthou A1 - Tamassia, Roberto KW - authenticated data structures KW - data integrity KW - Security KW - untrusted outsourced storage AB - Outsourced storage has become more and more practical in recent years. Users can now store large amounts of data in multiple servers at a relatively low price. An important issue for outsourced storage systems is to design an efficient scheme to assure users that their data stored at remote servers has not been tampered with. This paper presents a general method and a practical prototype application for verifying the integrity of files in an untrusted network storage service. The verification process is managed by an application running in a trusted environment (typically on the client) that stores just one cryptographic hash value of constant size, corresponding to the "digest" of an authenticated data structure. The proposed integrity verification service can work with any storage service since it is transparent to the storage technology used. Experimental results show that our integrity verification method is efficient and practical for network storage systems. JA - StorageSS '08 Proceedings of the 4th ACM International Workshop on Storage Security and Survivability T3 - StorageSS '08 PB - ACM SN - 978-1-60558-299-3 UR - http://doi.acm.org/10.1145/1456469.1456479 ER -