Advertisement

An Infrastructure for Long-Term Archiving of Authenticated and Sensitive Electronic Documents

  • Thiago Acórdi Ramos
  • Nelson da Silva
  • Lau Cheuk Lung
  • Jonathan Gehard Kohler
  • Ricardo Felipe Custódio
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6711)

Abstract

Secure archiving of authenticated and sensitive documents is becoming a necessity due to the dematerialization of paper based documents and processes. Huhnlein et al. combined the Open Archival Information System (OAIS) Reference Model, Evidence Record Syntax (ERS) with Secret Sharing and proposed the Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data. However, their proposal requires the secret reconstruction and redistribution whenever there are changes in the structure of the servers. In addition, there are some unhandled problems (e.g. compromise of the servers) and open issues (e.g. specification of a protocol) in their proposal. In this article we propose the use of a modified version of Gupta’s and Gopinath’s protocol G\(_{its}^{2}\) Verifiable Secret Redistribution (VSR), among other mechanisms, in order to improve the reference architecture, making it suitable for long-term archiving.

Keywords

long-term archiving secrecy confidentiality authenticity secret sharing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Adya, A., Bolosky, W.J., Castro, M., Cermak, G., Chaiken, R., Douceur, J.R., Howell, J., Lorch, J.R., Theimer, M., Wattenhofer, R.P.: Farsite: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment. Operating Systems Design and Implementation (2002)Google Scholar
  2. 2.
    Beagrie, N., Jones, M.: Preservation Management of Digital Materials: The Handbook. Digital Preservation Coalition (2002)Google Scholar
  3. 3.
    Blazic, A.: Long Term Trusted Archive Services. In: First International Conference on the Digital Society (ICDS 2007), pp. 29–29 (2007)Google Scholar
  4. 4.
    Borghoff, U., Rödig, P., Scheffczyk, J., Schmitz, L.: Long-term Preservation of Digital Documents: Principles and Practices (2006)Google Scholar
  5. 5.
    Brandner, R., Pordesch, U.: Long-term conservation of provability of electronically signed documents. Beitrag zu ISSE, pp. 2–5 (2002)Google Scholar
  6. 6.
    Brandner, R., Pordesch, U., Gondrom, T.: Evidence Record Syntax (ERS). Internet Engineering Task Force (IETF) Networking Group, Request for Comments 4998 (2007)Google Scholar
  7. 7.
    Desmedt, Y., Jajodia, S.: Redistributing Secret Shares to New Access Structures and its Applications (1997)Google Scholar
  8. 8.
    Druschel, P., Rowstron, A.: PAST: a Large-scale, Persistent Peer-to-Peer Storage Utility. In: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, 2001, pp. 75–80 (2001)Google Scholar
  9. 9.
    European Telecommunications Standards Institute: Electronic Signatures and Infrastructures (ESI); CMS Advanced Electronic Signatures (CAdES) (November 2009)Google Scholar
  10. 10.
    European Telecommunications Standards Institute: Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES) (June 2009)Google Scholar
  11. 11.
    Feldman, P.: A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In: 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp. 427–438 (October 1987)Google Scholar
  12. 12.
    Gupta, V.H., Gopinath, K.: G\(_{its}^{2}\) VSR: An Information Theoretical Secure Verifiable Secret Redistribution Protocol for Long-Term Archival Storage. In: Fourth International IEEE Security in Storage Workshop, pp. 22–33 (2007)Google Scholar
  13. 13.
    Gupta, V., Gopinath, K.: An Extended Verifiable Secret Redistribution Protocol for Archival Systems. IEEE, Los Alamitos (2006)CrossRefGoogle Scholar
  14. 14.
    Haber, S., Stornetta, W.: How to Time-Stamp a Digital Document. Journal of Cryptology 3(2), 99–111 (1991)CrossRefzbMATHGoogle Scholar
  15. 15.
    Haeberlen, A., Mislove, A., Druschel, P.: Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, vol. 2 (2005)Google Scholar
  16. 16.
    Herzberg, A., Krawczyk, H., Yung, M.: Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. IBM TJ. Watson Research Center, 1–22 (1995)Google Scholar
  17. 17.
    Huhnlein, D., Korte, U., Langer, L., Wiesmaier, A.: A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data. In: 2009 3rd International Conference on New Technologies, Mobility and Security, pp. 1–5 (December 2009)Google Scholar
  18. 18.
    ISO: ISO/IEC 14721:2003: Space Data and Information Transfer Systems — Open Archival Information System — Reference Model. International Standardization Organization, Geneva, Switzerland (2003)Google Scholar
  19. 19.
    Kotla, R., Alvisi, L., Dahlin, M.: SafeStore: a Durable and Practical Storage System. In: 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference (2007)Google Scholar
  20. 20.
    Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: OceanStore: an Architecture for Global-Scale Persistent Storage. ACM SIGPLAN Notices 35(11) (2000)Google Scholar
  21. 21.
    Merkle, R.C.: Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy, vol. 0, p. 122 (1980)Google Scholar
  22. 22.
    Miyamoto, T., Doi, S., Nogawa, H., Kumagai, S.: Autonomous Distributed Secret Sharing Storage System. Systems and Computers in Japan 37(6), 55–63 (2006)CrossRefGoogle Scholar
  23. 23.
    Nikov, V., Nikova, S.: On proactive secret sharing schemes. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 308–325. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  24. 24.
    Pedersen, T.P.: Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)Google Scholar
  25. 25.
    Pinkas, D., Pope, N., Ross, J.: CMS Advanced Electronic Signatures (CAdES). Internet Engineering Task Force (IETF) Networking Group, Request for Comments 5126 (2008)Google Scholar
  26. 26.
    Pinkas, D., Ross, J., Pope, N.: Electronic Signature Formats for Long Term Electronic Signatures. Internet Engineering Task Force (IETF) Networking Group, Request for Comments 3126 (2001)Google Scholar
  27. 27.
    Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  28. 28.
    Storer, M.W., Greenan, K.M., Miller, E.L., Voruganti, K.: POTSHARDS—a secure, recoverable, long-term archival storage system. ACM Transactions on Storage 5(2), 1–35 (2009)CrossRefGoogle Scholar
  29. 29.
    Wallace, C., Pordesch, U., Brandner, R.: Long-term Archive Service Requirements. Internet Engineering Task Force (IETF) Networking Group, Request for Comments 4810 (2007)Google Scholar
  30. 30.
    Wang, E., Yau, J., Hui, L., Jiang, Z., Yiu, S.: A Key-Recovery System for Long-term Encrypted Documents. IEEE, Los Alamitos (2006)CrossRefGoogle Scholar
  31. 31.
    Wong, T., Wing, J.: Verifiable Secret Redistribution for Archive Systems. In: Proceedings of First International IEEE Security in Storage Workshop, 2002, pp. 94–105 (December 2002)Google Scholar
  32. 32.
    Zimmer, W., Langkabel, T., Hentrich, C.: ArchiSafe: Legally Compliant Electronic Storage. IT Professional 10(4), 2633 (2008)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Thiago Acórdi Ramos
    • 1
  • Nelson da Silva
    • 1
  • Lau Cheuk Lung
    • 1
  • Jonathan Gehard Kohler
    • 1
  • Ricardo Felipe Custódio
    • 1
  1. 1.Computer Security Laboratory Computer Science Graduate ProgramFederal University of Santa CatarinaFlorianópolisBrazil

Personalised recommendations