简短公告:可审计的寄存器模拟

V. Cogo, A. Bessani
{"title":"简短公告:可审计的寄存器模拟","authors":"V. Cogo, A. Bessani","doi":"10.4230/LIPIcs.DISC.2021.53","DOIUrl":null,"url":null,"abstract":"We initiate the study of auditable storage emulations, which provide the capability for an auditor to report the previously executed reads in a register. We define the notion of auditable register and its properties, and establish tight bounds and impossibility results for auditable storage emulations in the presence of faulty base storage objects. Our formulation considers registers that securely store data using information dispersal (each base object stores only a block of the written value) and supporting fast reads (that complete in one communication round-trip). In such a scenario, given a maximum number f of faulty storage objects and a minimum number τ of data blocks required to recover a stored value, we prove that (R1) auditability is impossible if τ ≤ 2f ; (R2) implementing a weak form of auditability requires τ ≥ 3f + 1; and (R3) a stronger form of auditability is impossible. We also show that (R4) signing read requests generically overcomes the lower bound of weak auditability, while (R5 and R6) totally ordering operations or using non-fast reads enables strong auditability. These results establish that practical storage emulations need f to 2f additional objects compared to their original lower bounds to support auditability. 2012 ACM Subject Classification Computing methodologies → Distributed algorithms; Computer systems organization → Reliability; Security and privacy → Information accountability and usage control; Applied computing → Evidence collection, storage and analysis","PeriodicalId":89463,"journal":{"name":"Proceedings of the ... International Symposium on High Performance Distributed Computing","volume":"12 1","pages":"53:1-53:4"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Brief Announcement: Auditable Register Emulations\",\"authors\":\"V. Cogo, A. Bessani\",\"doi\":\"10.4230/LIPIcs.DISC.2021.53\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We initiate the study of auditable storage emulations, which provide the capability for an auditor to report the previously executed reads in a register. We define the notion of auditable register and its properties, and establish tight bounds and impossibility results for auditable storage emulations in the presence of faulty base storage objects. Our formulation considers registers that securely store data using information dispersal (each base object stores only a block of the written value) and supporting fast reads (that complete in one communication round-trip). In such a scenario, given a maximum number f of faulty storage objects and a minimum number τ of data blocks required to recover a stored value, we prove that (R1) auditability is impossible if τ ≤ 2f ; (R2) implementing a weak form of auditability requires τ ≥ 3f + 1; and (R3) a stronger form of auditability is impossible. We also show that (R4) signing read requests generically overcomes the lower bound of weak auditability, while (R5 and R6) totally ordering operations or using non-fast reads enables strong auditability. These results establish that practical storage emulations need f to 2f additional objects compared to their original lower bounds to support auditability. 2012 ACM Subject Classification Computing methodologies → Distributed algorithms; Computer systems organization → Reliability; Security and privacy → Information accountability and usage control; Applied computing → Evidence collection, storage and analysis\",\"PeriodicalId\":89463,\"journal\":{\"name\":\"Proceedings of the ... International Symposium on High Performance Distributed Computing\",\"volume\":\"12 1\",\"pages\":\"53:1-53:4\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the ... International Symposium on High Performance Distributed Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4230/LIPIcs.DISC.2021.53\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ... International Symposium on High Performance Distributed Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4230/LIPIcs.DISC.2021.53","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

我们开始研究可审计的存储模拟,它为审计员提供了报告以前在寄存器中执行的读操作的能力。我们定义了可审计寄存器的概念及其属性,并建立了存在错误基本存储对象的可审计存储仿真的紧边界和不可能结果。我们的公式考虑使用信息分散(每个基本对象仅存储写入值的一个块)和支持快速读取(在一次通信往返中完成)安全地存储数据的寄存器。在这种情况下,给定故障存储对象的最大数量f和恢复存储值所需的数据块的最小数量τ,我们证明如果τ≤2f, (R1)可审计性是不可能的;(R2)实施弱形式的可审计性要求τ≥3f + 1;(R3)更强形式的可审计性是不可能的。我们还表明(R4)签名读请求通常克服了弱可审计性的下限,而(R5和R6)完全排序操作或使用非快速读可以实现强可审计性。这些结果表明,为了支持可审计性,实际的存储模拟需要比原来的下限多f到2f个对象。2012 ACM主题分类计算方法→分布式算法;计算机系统组织→可靠性;安全与隐私→信息责任制与使用控制;应用计算→证据收集、存储和分析
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Brief Announcement: Auditable Register Emulations
We initiate the study of auditable storage emulations, which provide the capability for an auditor to report the previously executed reads in a register. We define the notion of auditable register and its properties, and establish tight bounds and impossibility results for auditable storage emulations in the presence of faulty base storage objects. Our formulation considers registers that securely store data using information dispersal (each base object stores only a block of the written value) and supporting fast reads (that complete in one communication round-trip). In such a scenario, given a maximum number f of faulty storage objects and a minimum number τ of data blocks required to recover a stored value, we prove that (R1) auditability is impossible if τ ≤ 2f ; (R2) implementing a weak form of auditability requires τ ≥ 3f + 1; and (R3) a stronger form of auditability is impossible. We also show that (R4) signing read requests generically overcomes the lower bound of weak auditability, while (R5 and R6) totally ordering operations or using non-fast reads enables strong auditability. These results establish that practical storage emulations need f to 2f additional objects compared to their original lower bounds to support auditability. 2012 ACM Subject Classification Computing methodologies → Distributed algorithms; Computer systems organization → Reliability; Security and privacy → Information accountability and usage control; Applied computing → Evidence collection, storage and analysis
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信