{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T00:10:19Z","timestamp":1739146219826,"version":"3.37.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2009,6,5]],"date-time":"2009-06-05T00:00:00Z","timestamp":1244160000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1007\/s10207-009-0081-6","type":"journal-article","created":{"date-parts":[[2009,6,6]],"date-time":"2009-06-06T00:15:51Z","timestamp":1244247351000},"page":"357-377","source":"Crossref","is-referenced-by-count":9,"title":["CRUST: cryptographic remote untrusted storage without public keys"],"prefix":"10.1007","volume":"8","author":[{"given":"Erel","family":"Geron","sequence":"first","affiliation":[]},{"given":"Avishai","family":"Wool","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,6,5]]},"reference":[{"key":"81_CR1","doi-asserted-by":"crossref","unstructured":"Adya, A., Bolosky, W.J., Castro, M., Cermak, G., Chaiken, R., Douceur, J.R., Howell, J., Lorch, J.R., Theimer M., Wattenhofer R.: FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In: Proceedings of OSDI (2002)","DOI":"10.1145\/1060289.1060291"},{"key":"81_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., Cachin, C., Oprea, A.: Secure key-updating for lazy revocation. In: Proceedings of ESORICS. Lecture Notes in Computer Science, vol. 4189, pp. 327\u2013346. Springer, Berlin (2006)","DOI":"10.1007\/11863908_21"},{"key":"81_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: HMAC: Keyed-hashing for message authentication. RFC 2104, February (1997)","DOI":"10.1007\/3-540-68697-5_1"},{"key":"81_CR4","unstructured":"Black, J., Urtubia, H.: Side-channel attacks on symmetric encryption schemes: the case for authenticated encryption. In: Proceedings of the 11th USENIX Security Symposium, pp. 327\u2013338. USENIX Association, Berkeley (2002)"},{"key":"81_CR5","doi-asserted-by":"crossref","unstructured":"Blaze, M.: A cryptographic file system for Unix. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 9\u201316 (1993)","DOI":"10.1145\/168588.168590"},{"key":"81_CR6","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: CRYPTO \u201901: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp. 213\u2013229. Springer, London (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"81_CR7","unstructured":"Bray, T.: The Bonnie home page. Located at http:\/\/www.textuality.com\/bonnie (1996)"},{"key":"81_CR8","unstructured":"Cattaneo, G., Catuogno, L., Del Sorbo, A., Persiano, P.: The design and implementation of a transparent cryptographic file system for Unix. In: Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, pp. 199\u2013212. USENIX Association, Berkeley (2001)"},{"key":"81_CR9","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for block cipher modes of operation. Special Publication 800-38A, NIST (2001)","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"81_CR10","unstructured":"Fu, K., Kamara, S., Kohno, T.: Key regression: Enabling efficient key distribution for secure distributed storage. In: Proceedings of NDSS (2006)"},{"key":"81_CR11","unstructured":"Gobioff, H., Gibson, G., Tygar, D.: Security for network attached storage devices. Technical Report CMU-CS-97-185, Carnegie Mellon University, October (1997)"},{"key":"81_CR12","unstructured":"Goh, E.-J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing remote untrusted storage. In: Proceedings of NDSS. The Internet Society, Geneva (2003)"},{"key":"81_CR13","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"Goldreich O., Goldwasser S., Micali S.: How to construct random functions. J. ACM 33, 792\u2013807 (1986)","journal-title":"J. ACM"},{"issue":"1","key":"81_CR14","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1145\/174613.174616","volume":"12","author":"J.S. Heidemann","year":"1994","unstructured":"Heidemann J.S., Popek G.J.: File-system development with stackable layers. ACM Trans. Comput. Syst. 12(1), 58\u201389 (1994)","journal-title":"ACM Trans. Comput. Syst."},{"key":"81_CR15","unstructured":"Jakobsson, M.: Fractal hash sequence representation and traversal. In: IEEE International Symposium on Information Theory (2002)"},{"key":"81_CR16","unstructured":"Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: scalable secure file sharing on untrusted storage. In: Proceedings of FAST. USENIX, Berkeley (2003)"},{"key":"81_CR17","doi-asserted-by":"crossref","unstructured":"Kher, V., Kim, Y.: Securing distributed storage: challenges, techniques, and systems. In: StorageSS \u201905: Proceedings of the 2005 ACM workshop on Storage security and survivability, pp. 9\u201325. ACM Press, New York (2005)","DOI":"10.1145\/1103780.1103783"},{"key":"81_CR18","unstructured":"Kher, V., Seppanen, E., Leach, C., Kim, Y.: SGFS: Secure, efficient and policy-based global file sharing. In: Proceedings of the 23rd IEEE\/14th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST 2006) (2006)"},{"key":"81_CR19","unstructured":"Kleiman, S.R.: Vnodes: an architecture for multiple file system types in Sun UNIX. In: Proceedings of the USENIX summer conference, pp. 238\u2013247 (1986)"},{"key":"81_CR20","doi-asserted-by":"crossref","unstructured":"Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S.E., Eaton, P.R., Geels, D., Gummadi, R., Rhea, S.C., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.Y.: OceanStore: an architecture for global-scale persistent storage. In: Proceedings of ASPLOS, pp. 190\u2013201 (2000)","DOI":"10.1145\/356989.357007"},{"key":"81_CR21","doi-asserted-by":"crossref","unstructured":"Leighton, F.T., Micali, S.: Secret-key agreement without public-key cryptography. In: Proceedings of CRYPTO. Lecture Notes in Computer Science, vol. 773, pp. 456\u2013479. Springer, Heidelberg (1993)","DOI":"10.1007\/3-540-48329-2_39"},{"key":"81_CR22","doi-asserted-by":"crossref","unstructured":"Li, J., Krohn, M.N., Mazi\u00e8res, D., Shasha, D.: Secure untrusted data repository (SUNDR). In: Proceedings of OSDI, pp. 121\u2013136 (2004)","DOI":"10.21236\/ADA445862"},{"key":"81_CR23","doi-asserted-by":"crossref","unstructured":"Mazi\u00e8res, D., Kaminsky, M., Kaashoek, M.F., Witchel, E.: Separating key management from file system security. In: Proceedings of the 17th ACM Symposium on Operating System Principles, pp. 124\u2013139 (1999)","DOI":"10.1145\/319151.319160"},{"key":"81_CR24","doi-asserted-by":"crossref","unstructured":"Mazi\u00e8res, D., Shasha, D.: Don\u2019t trust your file server. In: Proceedings of HotOS, pp. 113\u2013118. IEEE Computer Society, Washington, DC (2001)","DOI":"10.1109\/HOTOS.2001.990070"},{"key":"81_CR25","unstructured":"Miller, E.L., Long, D.D.E., Freeman, W.E., Reed, B.: Strong security for network-attached storage. In: Proceedings of FAST, pp. 1\u201313, (2002)"},{"key":"81_CR26","doi-asserted-by":"crossref","unstructured":"Naor, D., Shenhav, A., Wool, A.: Toward securing untrusted storage without public-key operations. In: StorageSS \u201905: Proceedings of the 2005 ACM workshop on Storage security and survivability, pp. 51\u201356. ACM Press, New York (2005)","DOI":"10.1145\/1103780.1103788"},{"key":"81_CR27","unstructured":"NIST: Advanced encryption standard. Federal Information Processing Standards, FIPS PUB 197 (2001)"},{"key":"81_CR28","unstructured":"NIST: Secure hash standard. Federal Information Processing Standards, FIPS PUB 180-2 (2004)"},{"key":"81_CR29","unstructured":"Riedel, E., Kallahalla, M., Swaminathan, R.: A framework for evaluating storage system security. In: Proceedings of FAST, pp. 15\u201330 (2002)"},{"key":"81_CR30","unstructured":"Rubin, A.D.: Kerberos versus the Leighton-Micali protocol. Dr. Dobb\u2019s J. Softw. Tools 25(11), 21\u201322 (2000)"},{"key":"81_CR31","unstructured":"Stanton, P.: Securing data in storage: a review of current research. CoRR, cs.OS\/0409034 (2004)"},{"key":"81_CR32","unstructured":"Steiner, J.G., Neuman, B.C., Schiller, J.I.: Kerberos: an authentication service for open network systems. In: Proceedings of the USENIX Winter Conference, pp. 191\u2013202 (1988)"},{"key":"81_CR33","unstructured":"Szeredi, M.: Filesystem in userspace. Located at http:\/\/fuse.sourceforge.net"},{"key":"81_CR34","unstructured":"The OpenSSL project. Located at http:\/\/www.openssl.org"},{"key":"81_CR35","unstructured":"Wright, C.P., Martino, M.C., Zadok, E.: NCryptfs: A secure and convenient cryptographic file system. In: Proceedings of the Annual USENIX Technical Conference, pp. 197\u2013210 (2003)"},{"key":"81_CR36","unstructured":"Zadok, E., Badulescu, I., Shender, A.: Cryptfs: A stackable vnode level encryption file system. Technical Report CUCS-021-98. Computer Science Department, Columbia University (1998)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0081-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-009-0081-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0081-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T23:52:48Z","timestamp":1739145168000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-009-0081-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,5]]},"references-count":36,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["81"],"URL":"https:\/\/doi.org\/10.1007\/s10207-009-0081-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2009,6,5]]}}}