Title :
Tamper Difficult Technique for Data Residing on Passive Storage
Author_Institution :
Sch. of Math. & Comput. Sci., Guilin Univ. of Electron. Technol., Guilin
Abstract :
For storage service, irrespective of the form of the relationship between data owner and storage holder, how can a data owner extract evidence on corrupting its inquilinous data remains to be resolved, especially when the data owner is not the storage holder. Up to now, no technique can offer self-detection technique for data deletion residing on raw disk that is directly exposed to attackers. In this paper, we devote our efforts to building such a mechanism in an untrusted storage place (passive repository) by means of file-chunks entangled method. This provides a foundation for constructing trustworthy virtual network disk storage tool in distributed environment.
Keywords :
disc storage; security of data; storage management; data deletion; data owner; file-chunks entangled method; passive repository; passive storage; raw disk; self detection; storage holder; storage service; tamper difficult technique; Access control; Buildings; Computer network reliability; Cryptography; Data mining; Data security; Electronic commerce; Mathematics; Protection; Secure storage; Pairing; Passive storage; Tamper;
Conference_Titel :
Electronic Commerce and Security, 2008 International Symposium on
Conference_Location :
Guangzhou City
Print_ISBN :
978-0-7695-3258-5
DOI :
10.1109/ISECS.2008.123