Trusting the cloud

More and more users store data in "clouds" that are accessed remotely over the Internet. We survey well-known cryptographic tools for providing integrity and consistency for data stored in clouds and discuss recent research in cryptography and distributed computing addressing these problems.

[1]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[2]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.

[3]  Idit Keidar,et al.  Fail-Aware Untrusted Storage , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[4]  Leslie Lamport,et al.  How to Make a Multiprocessor Computer That Correctly Executes Multiprocess Programs , 2016, IEEE Transactions on Computers.

[5]  Marvin Theimer,et al.  Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.

[6]  Gene Tsudik,et al.  Authentication and integrity in outsourced databases , 2006, TOS.

[7]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[8]  Roberto Tamassia,et al.  Authenticated hash tables , 2008, CCS.

[9]  David Mazières,et al.  Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems , 2007, NSDI.

[10]  Abhi Shelat,et al.  Efficient fork-linearizable access to untrusted shared memory , 2007, PODC '07.

[11]  Jeffrey S. Chase,et al.  Strong accountability for network storage , 2007, TOS.

[12]  Maurice Herlihy,et al.  Wait-free synchronization , 1991, TOPL.

[13]  Maurice Herlihy,et al.  Linearizability: a correctness condition for concurrent objects , 1990, TOPL.

[14]  Idit Keidar,et al.  Byzantine disk paxos: optimal resilience with byzantine shared memory , 2004, PODC '04.

[15]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[16]  Michael K. Reiter,et al.  Low-overhead byzantine fault-tolerant storage , 2007, SOSP.

[17]  Michael K. Reiter,et al.  Byzantine quorum systems , 1997, STOC '97.

[18]  Scott Shenker,et al.  Attested append-only memory: making adversaries stick to their word , 2007, SOSP.

[19]  Manuel Blum,et al.  Checking the correctness of memories , 2005, Algorithmica.

[20]  Dennis Shasha,et al.  Building secure file systems out of byzantine storage , 2002, PODC '02.

[21]  Flaviu Cristian,et al.  Fail-awareness in timed asynchronous systems , 1996, PODC '96.

[22]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[23]  Michael K. Reiter,et al.  On Consistency of Encrypted Files , 2006, DISC.

[24]  Hovav Shacham,et al.  SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.

[25]  Radek Vingralek,et al.  How to build a trusted database system on untrusted storage , 2000, OSDI.

[26]  Idit Keidar,et al.  Fork sequential consistency is blocking , 2009, Inf. Process. Lett..

[27]  Mustaque Ahamad,et al.  Slow memory: weakening consistency to enhance concurrency in distributed shared memories , 1990, Proceedings.,10th International Conference on Distributed Computing Systems.

[28]  Dennis Shasha,et al.  Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.

[29]  BirmanKen,et al.  Toward a cloud computing research agenda , 2009 .

[30]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.