Auditable Register Emulations

The widespread prevalence of data breaches amplifies the importance of auditing storage systems. In this work, we initiate the study of auditable storage emulations, which provide the capability for an auditor to report the previously executed reads in a register. We precisely define the notion of a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Cogo, Vinicius V, Bessani, Alysson
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Cogo, Vinicius V
Bessani, Alysson
description The widespread prevalence of data breaches amplifies the importance of auditing storage systems. In this work, we initiate the study of auditable storage emulations, which provide the capability for an auditor to report the previously executed reads in a register. We precisely define the notion of auditable register and its properties, and establish tight bounds and impossibility results for auditable storage emulations in the presence of faulty storage objects. Our formulation considers loggable read-write registers that securely store data using information dispersal and support fast reads. In such a scenario, given a maximum number~$f$ of faulty storage objects and a minimum number~$\tau$ of data blocks required to recover a stored value, we prove that (1) auditability is impossible if $\tau \leq 2f $; (2) implementing a weak form of auditability requires $\tau \geq 3f+1$; and (3) a stronger form of auditability is impossible. We also show that signing read requests overcomes the lower bound of weak auditability, while totally ordering operations or using non-fast reads enables strong auditability.
doi_str_mv 10.48550/arxiv.1905.08637
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1905_08637</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1905_08637</sourcerecordid><originalsourceid>FETCH-LOGICAL-a677-ad8a60191955f58594e1e53129700d6e355ad5241a9dcbc814a1e7d734b36a763</originalsourceid><addsrcrecordid>eNotzskKwjAUQNFsXIj6AS7E_kBrnsnLsJRSBxAEcV9eTSqBOtBB9O_F6uruLoexKfBEGkS-oPoVnglYjgk3Sughm606F1oqKh8d_SU0ra-j7NpV1Ib7rRmzQUlV4yf_jthpnZ3Sbbw_bHbpah-T0jomZ0hxsGARSzRopQePApZWc-6UF4jkcCmBrDsXZwOSwGunhSyEIq3EiM1_296XP-pwpfqdf5157xQfqv42Kg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Auditable Register Emulations</title><source>arXiv.org</source><creator>Cogo, Vinicius V ; Bessani, Alysson</creator><creatorcontrib>Cogo, Vinicius V ; Bessani, Alysson</creatorcontrib><description>The widespread prevalence of data breaches amplifies the importance of auditing storage systems. In this work, we initiate the study of auditable storage emulations, which provide the capability for an auditor to report the previously executed reads in a register. We precisely define the notion of auditable register and its properties, and establish tight bounds and impossibility results for auditable storage emulations in the presence of faulty storage objects. Our formulation considers loggable read-write registers that securely store data using information dispersal and support fast reads. In such a scenario, given a maximum number~$f$ of faulty storage objects and a minimum number~$\tau$ of data blocks required to recover a stored value, we prove that (1) auditability is impossible if $\tau \leq 2f $; (2) implementing a weak form of auditability requires $\tau \geq 3f+1$; and (3) a stronger form of auditability is impossible. We also show that signing read requests overcomes the lower bound of weak auditability, while totally ordering operations or using non-fast reads enables strong auditability.</description><identifier>DOI: 10.48550/arxiv.1905.08637</identifier><language>eng</language><subject>Computer Science - Distributed, Parallel, and Cluster Computing</subject><creationdate>2019-05</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1905.08637$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1905.08637$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Cogo, Vinicius V</creatorcontrib><creatorcontrib>Bessani, Alysson</creatorcontrib><title>Auditable Register Emulations</title><description>The widespread prevalence of data breaches amplifies the importance of auditing storage systems. In this work, we initiate the study of auditable storage emulations, which provide the capability for an auditor to report the previously executed reads in a register. We precisely define the notion of auditable register and its properties, and establish tight bounds and impossibility results for auditable storage emulations in the presence of faulty storage objects. Our formulation considers loggable read-write registers that securely store data using information dispersal and support fast reads. In such a scenario, given a maximum number~$f$ of faulty storage objects and a minimum number~$\tau$ of data blocks required to recover a stored value, we prove that (1) auditability is impossible if $\tau \leq 2f $; (2) implementing a weak form of auditability requires $\tau \geq 3f+1$; and (3) a stronger form of auditability is impossible. We also show that signing read requests overcomes the lower bound of weak auditability, while totally ordering operations or using non-fast reads enables strong auditability.</description><subject>Computer Science - Distributed, Parallel, and Cluster Computing</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzskKwjAUQNFsXIj6AS7E_kBrnsnLsJRSBxAEcV9eTSqBOtBB9O_F6uruLoexKfBEGkS-oPoVnglYjgk3Sughm606F1oqKh8d_SU0ra-j7NpV1Ib7rRmzQUlV4yf_jthpnZ3Sbbw_bHbpah-T0jomZ0hxsGARSzRopQePApZWc-6UF4jkcCmBrDsXZwOSwGunhSyEIq3EiM1_296XP-pwpfqdf5157xQfqv42Kg</recordid><startdate>20190521</startdate><enddate>20190521</enddate><creator>Cogo, Vinicius V</creator><creator>Bessani, Alysson</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20190521</creationdate><title>Auditable Register Emulations</title><author>Cogo, Vinicius V ; Bessani, Alysson</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a677-ad8a60191955f58594e1e53129700d6e355ad5241a9dcbc814a1e7d734b36a763</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Computer Science - Distributed, Parallel, and Cluster Computing</topic><toplevel>online_resources</toplevel><creatorcontrib>Cogo, Vinicius V</creatorcontrib><creatorcontrib>Bessani, Alysson</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cogo, Vinicius V</au><au>Bessani, Alysson</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Auditable Register Emulations</atitle><date>2019-05-21</date><risdate>2019</risdate><abstract>The widespread prevalence of data breaches amplifies the importance of auditing storage systems. In this work, we initiate the study of auditable storage emulations, which provide the capability for an auditor to report the previously executed reads in a register. We precisely define the notion of auditable register and its properties, and establish tight bounds and impossibility results for auditable storage emulations in the presence of faulty storage objects. Our formulation considers loggable read-write registers that securely store data using information dispersal and support fast reads. In such a scenario, given a maximum number~$f$ of faulty storage objects and a minimum number~$\tau$ of data blocks required to recover a stored value, we prove that (1) auditability is impossible if $\tau \leq 2f $; (2) implementing a weak form of auditability requires $\tau \geq 3f+1$; and (3) a stronger form of auditability is impossible. We also show that signing read requests overcomes the lower bound of weak auditability, while totally ordering operations or using non-fast reads enables strong auditability.</abstract><doi>10.48550/arxiv.1905.08637</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1905.08637
ispartof
issn
language eng
recordid cdi_arxiv_primary_1905_08637
source arXiv.org
subjects Computer Science - Distributed, Parallel, and Cluster Computing
title Auditable Register Emulations
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T23%3A37%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Auditable%20Register%20Emulations&rft.au=Cogo,%20Vinicius%20V&rft.date=2019-05-21&rft_id=info:doi/10.48550/arxiv.1905.08637&rft_dat=%3Carxiv_GOX%3E1905_08637%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true