Xiao et al., 2009 - Google Patents
VAOFS: A Verifiable Append-Only File System for Regulatory ComplianceXiao et al., 2009
- Document ID
- 8716837254268003857
- Author
- Xiao D
- Yao W
- Wu C
- Wang C
- Yang Y
- Publication year
- Publication venue
- 2009 Eighth International Conference on Grid and Cooperative Computing
External Links
Snippet
Append-only file systems, with which data can only be updated in an append-only manner, are of great importance to the regulatory compliance requirements for storing immutable data. However, existing approaches fail to provide the verifiability of the append-only …
- 230000001105 regulatory 0 title abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hasan et al. | Preventing history forgery with secure provenance | |
Yumerefendi et al. | Strong accountability for network storage | |
Snodgrass et al. | Tamper detection in audit logs | |
US11907199B2 (en) | Blockchain based distributed file systems | |
US7249251B2 (en) | Methods and apparatus for secure modification of a retention period for data in a storage system | |
US7996679B2 (en) | System and method for performing a trust-preserving migration of data objects from a source to a target | |
RU2351978C2 (en) | Method for provision of data records set integrity | |
US7580961B2 (en) | Methods and apparatus for modifying a retention period for data in a storage system | |
US7430645B2 (en) | Methods and apparatus for extending a retention period for data in a storage system | |
US20020184511A1 (en) | Secure accounting and operational control reporting system | |
US11868339B2 (en) | Blockchain based distributed file systems | |
CN111859411B (en) | Method and system for blockchains in a blockchain network | |
Peterson et al. | Design and Implementation of Verifiable Audit Trails for a Versioning File System. | |
Javed et al. | Blockchain-based logging to defeat malicious insiders: The case of remote health monitoring systems | |
US9292698B1 (en) | Method and system for remote forensic data collection | |
Gehani et al. | Accountable clouds | |
US7801920B2 (en) | Methods and apparatus for indirectly identifying a retention period for data in a storage system | |
Burns et al. | Verifiable audit trails for a versioning file system | |
Xiao et al. | VAOFS: A Verifiable Append-Only File System for Regulatory Compliance | |
Sion et al. | Fighting mallory the insider: Strong write-once read-many storage assurances | |
CN116028990B (en) | Anti-tampering privacy protection log auditing method based on blockchain | |
Mitra et al. | Trustworthy migration and retrieval of regulatory compliant records | |
EP4625233A1 (en) | System and method for enhancing security of big data systems using blockchain technologies | |
Yang et al. | Computer-aided simulation of optical interconnects for high-speed digital systems | |
Hasan | Trustworthy history and provenance for files and databases |