{"title":"Streamed or detached triple integrity for a time stamped secure storage system","authors":"A. Apvrille, J. Hughes, Vincent Girier","doi":"10.1109/SISW.2002.1183510","DOIUrl":null,"url":null,"abstract":"Organizations and companies with integrity concerns for their archivals are currently left with very few and unconvenient solutions. To cope with those needs, a Time Stamped Virtual WORM system has been proposed previously, but only its concepts and theory have been examined yet. Hence, this paper focuses on defining practical block formats to help implement this system in reality. But there are several pitfalls on the path of implementation, and this paper has to be extremely cautious not to introduce any limit - or security flaw into virtual WORMs. With such requirements, two different block formats are successfully defined: a streamed format where security data is inserted within user's documents, and a detached format where security information is written in a different location. Finally, the detached format is studied in the sample case of a tamper-evident FTP server.","PeriodicalId":183673,"journal":{"name":"First International IEEE Security in Storage Workshop, 2002. Proceedings.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"First International IEEE Security in Storage Workshop, 2002. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SISW.2002.1183510","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Organizations and companies with integrity concerns for their archivals are currently left with very few and unconvenient solutions. To cope with those needs, a Time Stamped Virtual WORM system has been proposed previously, but only its concepts and theory have been examined yet. Hence, this paper focuses on defining practical block formats to help implement this system in reality. But there are several pitfalls on the path of implementation, and this paper has to be extremely cautious not to introduce any limit - or security flaw into virtual WORMs. With such requirements, two different block formats are successfully defined: a streamed format where security data is inserted within user's documents, and a detached format where security information is written in a different location. Finally, the detached format is studied in the sample case of a tamper-evident FTP server.