Advertisement

Towards a Theory of Data Entanglement

  • James Aspnes
  • Joan Feigenbaum
  • Aleksandr Yampolskiy
  • Sheng Zhong
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3193)

Abstract

We give a formal model for systems that store data in entangled form. We propose a new notion of entanglement, called all-or-nothing integrity (AONI) that binds the users’ data in a way that makes it hard to corrupt the data of any one user without corrupting the data of all users. AONI can be a useful defense against negligent or dishonest storage providers who might otherwise be tempted to discard documents belonging to users without much clout. We show that, if all users use the standard recovery algorithm, we can implement AONI using a MAC, but, if some of the users adopt the adversary’s non-standard recovery algorithm, AONI can no longer be achieved. However, even for the latter scenario, we describe a simple entangling mechanism that provides AONI for a restricted class of destructive adversaries.

Keywords

Encode Scheme Data Entanglement Recovery Algorithm Symmetric Encode Entanglement Graph 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anderson, R.J.: The eternity service. In: Proceedings of PRAGOCRYPT 1996, pp. 242–252 (1996)Google Scholar
  2. 2.
    Aspnes, J., Feigenbaum, J., Yampolskiy, A., Zhong, S.: Towards a theory of data entanglement. Technical Report YALEU/DCS/TR-1277 (March 2004), Available at http://www.cs.yale.edu/~aspnes/entanglement-abstract.html
  3. 3.
    Barak, B., Goldreich, O., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 1. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  4. 4.
    Castro, M., Liskov, B.: Practical Byzantine fault tolerance. In: Proceedings of the 3rd Symposium on Operating Systems Design and Implementation, pp. 173–186 (1999)Google Scholar
  5. 5.
    Clarke, I., Sandberg, O., Wiley, B., Hong, T.: Freenet: A distributed information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 46–66. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  6. 6.
    Fu, K., Kaashoek, F., Mazieres, D.: Fast and secure distributed read-only file system. In: Proceedings of the 4th Symposium on Operating Systems Design and Implementation, pp. 181–196 (2000)Google Scholar
  7. 7.
    Gibson, G.A., Nagle, D.F., Amiri, K., Butler, J., Chang, F.W., Gobioff, H., Hardin, C., Riedel, E., Rochberg, D., Zelenka, J.: A cost-effective, high-bandwidth storage architecture. In: Proceedings of the 8th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 92–103 (1998)Google Scholar
  8. 8.
    Goh, E., Shacham, H., Mdadugu, N., Boneh, D.: Sirius: Securing remote untrusted storage. In: Proceedings of the Internet Society (ISOC) Network and Distributed Systems Security (NDSS) Symposium, pp. 131–145 (2003)Google Scholar
  9. 9.
    Goldberg, A., Yianilos, P.: Towards an archival intermemory. In: Proceedings of the IEEE International Forum on Research and Technology, Advances in Digital Libraries (ADL 1998), pp. 147–156. IEEE Computer Society, Los Alamitos (1998)CrossRefGoogle Scholar
  10. 10.
    Goldwasser, S., Bellare, M.: Lecture notes on cryptography. Summer Course “Cryptography and Computer Security” at MIT, 1996–1999 (1999)Google Scholar
  11. 11.
    Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen message attack. SIAM Journal on Computing 17(2), 281–308 (1988)MATHCrossRefMathSciNetGoogle Scholar
  12. 12.
    Maheshwari, U., Vingralek, R.: How to build a trusted database system on untrusted storage. In: Proceedings of the 4th Symposium on Operating Systems Design and Implementation, pp. 135–150 (2000)Google Scholar
  13. 13.
    Mazieres, D., Shasha, D.: Don’t trust your file server. In: Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems, pp. 99–104 (2001)Google Scholar
  14. 14.
    Mazieres, D., Shasha, D.: Building secure file systems out of Byzantine storage. In: Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, pp. 108–117 (2002)Google Scholar
  15. 15.
    Mazieres, D., Waldman, M.: Tangler: A censorship-resistant publishing system based on document entanglements. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 126–135 (2001)Google Scholar
  16. 16.
    Merkle, R.: Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy, pp. 122–134 (1980)Google Scholar
  17. 17.
    Mojo Nation. Technology overview (2000), Online at http://www.mojonation.net/docs/technical_overview.shtml
  18. 18.
    Rivest, R.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210–218. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  19. 19.
    Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)MATHCrossRefMathSciNetGoogle Scholar
  20. 20.
    Strunk, J., Goodson, G., Scheinholtz, M., Soules, C., Ganger, G.: Self-securing storage: Protecting data in compromised systems. In: Proceedings of the 4th Symposium on Operating Systems Design and Implementation, pp. 165–180 (2000)Google Scholar
  21. 21.
    Stubblefield, A., Wallach, D.S.: Dagster: Censorship-resistant publishing without replication. Technical Report TR01-380, Rice University (2001)Google Scholar
  22. 22.
    Waldman, M., Mazieres, D.: Tangler: A censorship-resistant publishing system based on document entanglements. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 126–135 (2001)Google Scholar
  23. 23.
    Waldman, M., Rubin, A., Cranor, L.: Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In: Proceedings of 9th USENIX Security Symposium (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • James Aspnes
    • 1
  • Joan Feigenbaum
    • 1
  • Aleksandr Yampolskiy
    • 1
  • Sheng Zhong
    • 1
  1. 1.Department of Computer ScienceYale UniversityNew HavenUSA

Personalised recommendations