TY - GEN
T1 - On protecting integrity and confidentiality of cryptographic file system for outsourced storage
AU - Yun, Aaram
AU - Shi, Chunhui
AU - Kim, Yongdae
PY - 2009
Y1 - 2009
N2 - A cryptographic network file system has to guarantee confidentiality and integrity of its files, and also it has to support random access. For this purpose, existing designs mainly rely on(often ad-hoc) combination of Merkle hash tree with a block cipher mode of encryption. In this paper, we propose a new design based on a MAC tree construction which uses a universal-hash based stateful MAC. This new design enables standard model security proof and also better performance compared with Merkle hash tree. We formally define the security notions for file encryption and prove that our scheme provides both confidentiality and integrity. We implement our scheme in coreFS, a user-level network file system, and evaluate the performance in comparison with the standard design. Experimental results confirm that our construction provides integrity protection at a smaller cost.
AB - A cryptographic network file system has to guarantee confidentiality and integrity of its files, and also it has to support random access. For this purpose, existing designs mainly rely on(often ad-hoc) combination of Merkle hash tree with a block cipher mode of encryption. In this paper, we propose a new design based on a MAC tree construction which uses a universal-hash based stateful MAC. This new design enables standard model security proof and also better performance compared with Merkle hash tree. We formally define the security notions for file encryption and prove that our scheme provides both confidentiality and integrity. We implement our scheme in coreFS, a user-level network file system, and evaluate the performance in comparison with the standard design. Experimental results confirm that our construction provides integrity protection at a smaller cost.
KW - Cryptographic file system
KW - File encryption scheme
KW - MAC tree
KW - Merkle hash tree
KW - Provable security
KW - Universal-hash based MAC
UR - http://www.scopus.com/inward/record.url?scp=74049138993&partnerID=8YFLogxK
U2 - 10.1145/1655008.1655017
DO - 10.1145/1655008.1655017
M3 - Conference contribution
AN - SCOPUS:74049138993
SN - 9781605587844
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 67
EP - 75
BT - Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09
T2 - 2009 ACM Workshop on Cloud Computing Security, CCSW '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09
Y2 - 9 November 2009 through 13 November 2009
ER -