{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:39:12Z","timestamp":1774946352893,"version":"3.50.1"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2007,10,1]],"date-time":"2007-10-01T00:00:00Z","timestamp":1191196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Storage"],"published-print":{"date-parts":[[2007,10]]},"abstract":"<jats:p>This article presents the design, implementation, and evaluation of CATS, a network storage service with strong accountability properties. CATS offers a simple web services interface that allows clients to read and write opaque objects of variable size. This interface is similar to the one offered by existing commercial Internet storage services. CATS extends the functionality of commercial Internet storage services by offering support for strong accountability.<\/jats:p><jats:p>A CATS server annotates read and write responses with evidence of correct execution, and offers audit and challenge interfaces that enable clients to verify that the server is faithful. A faulty server cannot conceal its misbehavior, and evidence of misbehavior is independently verifiable by any participant. CATS clients are also accountable for their actions on the service. A client cannot deny its actions, and the server can prove the impact of those actions on the state views it presented to other clients.<\/jats:p><jats:p>Experiments with a CATS prototype evaluate the cost of accountability under a range of conditions and expose the primary factors influencing the level of assurance and the performance of a strongly accountable storage server. The results show that strong accountability is practical for network storage systems in settings with strong identity and modest degrees of write-sharing. We discuss how the accountability concepts and techniques used in CATS generalize to other classes of network services.<\/jats:p>","DOI":"10.1145\/1288783.1288786","type":"journal-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:26:02Z","timestamp":1195136762000},"page":"11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":73,"title":["Strong accountability for network storage"],"prefix":"10.1145","volume":"3","author":[{"given":"Aydan R.","family":"Yumerefendi","sequence":"first","affiliation":[{"name":"Duke University, Durham, NC"}]},{"given":"Jeffrey S.","family":"Chase","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC"}]}],"member":"320","published-online":{"date-parts":[[2007,10]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095816"},{"key":"e_1_2_1_2_1","unstructured":"Amazon.com Inc. 2007. Amazon simple storage service (Amazon S3). http:\/\/www.amazon.com\/gp\/browse.html?node=16427261. Amazon.com Inc. 2007. Amazon simple storage service (Amazon S3). http:\/\/www.amazon.com\/gp\/browse.html?node=16427261."},{"key":"e_1_2_1_3_1","volume-title":"4th International Conference on Information Security.","author":"Anagnostopoulos A.","unstructured":"Anagnostopoulos , A. , Goodrich , M. T. , and Tamassia , R . 2001. Persistent authenticated dictionaries and their applications . In 4th International Conference on Information Security. Anagnostopoulos, A., Goodrich, M. T., and Tamassia, R. 2001. Persistent authenticated dictionaries and their applications. In 4th International Conference on Information Security."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/188280.188291"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00288683"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances on Cryptology, 480--494","author":"Benaloh J.","unstructured":"Benaloh , J. and de Mare, M. 1997. One-Way accumulators: A decentralized alternative to digital signatures (extended abstract) . In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances on Cryptology, 480--494 . Benaloh, J. and de Mare, M. 1997. One-Way accumulators: A decentralized alternative to digital signatures (extended abstract). In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances on Cryptology, 480--494."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352604"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances on Cryptology.","author":"Buldas A.","unstructured":"Buldas , A. , Laud , P. , Lipmaa , H. , and Villemson , J . 1998. Time-Stamping with binary linking schemes . In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances on Cryptology. Buldas, A., Laud, P., Lipmaa, H., and Villemson, J. 1998. Time-Stamping with binary linking schemes. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances on Cryptology."},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation.","author":"Castro M.","unstructured":"Castro , M. and Liskov , B . 1999. Practical Byzantine fault tolerance . In Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation. Castro, M. and Liskov, B. 1999. Practical Byzantine fault tolerance. In Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(89)90034-2"},{"key":"e_1_2_1_11_1","volume-title":"15th National Computer Security Conference.","author":"Ferraiolo D.","unstructured":"Ferraiolo , D. and Kuhn , R . 1992. Role-Based access controls . In 15th National Computer Security Conference. Ferraiolo, D. and Kuhn, R. 1992. Role-Based access controls. In 15th National Computer Security Conference."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the 4th USENIX Symposium on Operating Systems Design and Implementation, 181--196","author":"Fu K.","unstructured":"Fu , K. , Kaashoek , M. F. , and Mazi\u00e9res , D . 2000. Fast and secure distributed read-only file system . In Proceedings of the 4th USENIX Symposium on Operating Systems Design and Implementation, 181--196 . Fu, K., Kaashoek, M. F., and Mazi\u00e9res, D. 2000. Fast and secure distributed read-only file system. In Proceedings of the 4th USENIX Symposium on Operating Systems Design and Implementation, 181--196."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945459"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the DARPA Information Survivability Conference and Exposition, 68--82","author":"Goodrich M.","unstructured":"Goodrich , M. , Tamassia , R. , and Schwerin , A . 2001. Implementation of an authenticated dictionary with skip lists and commutative hashing . In Proceedings of the DARPA Information Survivability Conference and Exposition, 68--82 . Goodrich, M., Tamassia, R., and Schwerin, A. 2001. Implementation of an authenticated dictionary with skip lists and commutative hashing. In Proceedings of the DARPA Information Survivability Conference and Exposition, 68--82."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 2nd USENIX Conference on File and Storage Technologies.","author":"Kallahalla M.","unstructured":"Kallahalla , M. , Riedel , E. , Swaminathan , R. , Wang , Q. , and Fu , K . 2003. Plutus: scalable secure file sharing on untrusted storage . In Proceedings of the 2nd USENIX Conference on File and Storage Technologies. Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., and Fu, K. 2003. Plutus: scalable secure file sharing on untrusted storage. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies."},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the Annual Computer Security Applications Conference.","author":"Lampson B. W.","year":"2000","unstructured":"Lampson , B. W. 2000 . Computer security in the real world . In Proceedings of the Annual Computer Security Applications Conference. Lampson, B. W. 2000. Computer security in the real world. In Proceedings of the Annual Computer Security Applications Conference."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159935"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/319628.319663"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation, 91--106","author":"Li J.","unstructured":"Li , J. , Krohn , M. N. , Mazi\u00e8res , D. , and Shasha , D . 2004. Secure untrusted data repository (SUNDR) . In Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation, 91--106 . Li, J., Krohn, M. N., Mazi\u00e8res, D., and Shasha, D. 2004. Secure untrusted data repository (SUNDR). In Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation, 91--106."},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation, 105--120","author":"MacCormick J.","unstructured":"MacCormick , J. , Murphy , N. , Najork , M. , Thekkath , C. A. , and Zhou , L . 2004. Boxwood: Abstractions as the foundation for storage infrastructure . In Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation, 105--120 . MacCormick, J., Murphy, N., Najork, M., Thekkath, C. A., and Zhou, L. 2004. Boxwood: Abstractions as the foundation for storage infrastructure. In Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation, 105--120."},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the 4th USENIX Symposium on Operating System Design and Implementation.","author":"Maheshwari U.","unstructured":"Maheshwari , U. , Vingralek , R. , and Shapiro , W . 2000. How to build a trusted database system on untrusted storage . In Proceedings of the 4th USENIX Symposium on Operating System Design and Implementation. Maheshwari, U., Vingralek, R., and Shapiro, W. 2000. How to build a trusted database system on untrusted storage. In Proceedings of the 4th USENIX Symposium on Operating System Design and Implementation."},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the 1st USENIX Conference on File and Storage Technologies, 31--45","author":"Maniatis P.","unstructured":"Maniatis , P. and Baker , M . 2002a. Enabling the archival storage of signed documents . In Proceedings of the 1st USENIX Conference on File and Storage Technologies, 31--45 . Maniatis, P. and Baker, M. 2002a. Enabling the archival storage of signed documents. In Proceedings of the 1st USENIX Conference on File and Storage Technologies, 31--45."},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 11th USENIX Security Sysmposium.","author":"Maniatis P.","unstructured":"Maniatis , P. and Baker , M . 2002b. Secure history preservation through timeline entanglement . In Proceedings of the 11th USENIX Security Sysmposium. Maniatis, P. and Baker, M. 2002b. Secure history preservation through timeline entanglement. In Proceedings of the 11th USENIX Security Sysmposium."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571840"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839932"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks.","author":"Pearlman L.","unstructured":"Pearlman , L. , Welch , V. , Foster , I. , Kesselman , C. , and Tuecke , S . 2002. A community authorization service for group collaboration . In Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks. Pearlman, L., Welch, V., Foster, I., Kesselman, C., and Tuecke, S. 2002. A community authorization service for group collaboration. In Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks."},{"key":"e_1_2_1_29_1","volume-title":"the 1st USENIX Conference on File and Storage Technologies.","author":"Quinlan S.","unstructured":"Quinlan , S. and Dorward , S . 2002. Venti: A new approach to archival storage . In the 1st USENIX Conference on File and Storage Technologies. Quinlan, S. and Dorward, S. 2002. Venti: A new approach to archival storage. In the 1st USENIX Conference on File and Storage Technologies."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/121132.121137"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 7th USENIX Security Symposium, 53--62","author":"Schneier B.","unstructured":"Schneier , B. and Kelsey , J . 1998. Cryptographic support for secure logs on untrusted machines . In Proceedings of the 7th USENIX Security Symposium, 53--62 . Schneier, B. and Kelsey, J. 1998. Cryptographic support for secure logs on untrusted machines. In Proceedings of the 7th USENIX Security Symposium, 53--62."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317089"},{"key":"e_1_2_1_34_1","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/BFb0055474","article-title":"Using a high-performance, programmable secure coprocessor","author":"Smith S. W.","year":"1998","unstructured":"Smith , S. W. , Palmer , E. R. , and Weingart , S. 1998 . Using a high-performance, programmable secure coprocessor . In Financial Cryptography , Spring er, 73 -- 89 . Smith, S. W., Palmer, E. R., and Weingart, S. 1998. Using a high-performance, programmable secure coprocessor. In Financial Cryptography, Springer, 73--89.","journal-title":"Financial Cryptography"},{"key":"e_1_2_1_35_1","unstructured":"Tamassia R. and Triandopoulos N. 2003. On the cost of authenticated data structures. Tech. Rep. Brown University. Tamassia R. and Triandopoulos N. 2003. On the cost of authenticated data structures. Tech. Rep. Brown University."},{"key":"e_1_2_1_36_1","unstructured":"Trusted Computing Group. 2007. Trusted platform module specification. https:\/\/www. trustedcomputinggroup.org\/groups\/tpm\/. Trusted Computing Group. 2007. Trusted platform module specification. https:\/\/www. trustedcomputinggroup.org\/groups\/tpm\/."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502057"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133585"}],"container-title":["ACM Transactions on Storage"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1288783.1288786","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1288783.1288786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:58:03Z","timestamp":1750258683000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1288783.1288786"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,10]]}},"alternative-id":["10.1145\/1288783.1288786"],"URL":"https:\/\/doi.org\/10.1145\/1288783.1288786","relation":{},"ISSN":["1553-3077","1553-3093"],"issn-type":[{"value":"1553-3077","type":"print"},{"value":"1553-3093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,10]]},"assertion":[{"value":"2007-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}