Abstract
The CLOUDwerker project seeks to develop a tool that allows for the collaborative creation of documents in a cloud environment. This necessitates a secure, non-repudiable document storage layer. We introduce ReDS, a software backend that stores encrypted documents in the cloud. The system also guarantees the non-repudiability of changes, makes older revisions of files accessible and has access control. Our architecture makes use of a trusted master server to store encryption keys and perform authentication and authorization. We implemented ReDS using Python and several open-source components. ReDS is open source and available for download.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. Washington Post (2013). http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nineus-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html
Chasseur, C., Terrell, A.: Wingu - a synchronization layer for safe concurrent access to cloud storage (2010)
Feldman, A.J., Zeller, W.P., Freedman, M.J., Felten, E.W.: Sporc: Group collaboration using untrusted cloud resources. OSDI, Oct (2010) 58 Tobias Pöppke and Dirk Achenbach
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security (TISSEC) 4(3), 224–274 (2001)
Kumbhare, A., Simmhan, Y., Prasanna, V.: Cryptonite: A secure and performant data repository on public clouds. In: Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, pp. 510–517 (2012). DOI 10.1109/CLOUD.2012.109
Mahajan, P., Setty, S., Lee, S., Clement, A., Alvisi, L., Dahlin, M., Walfish, M.: Depot: Cloud storage with minimal trust. ACM Trans. Comput. Syst. 29(4), 12:1–12:38 (2011). DOI 10.1145/2063509.2063512. URL http://doi.acm.org/10.1145/2063509.2063512
Merkle, R.C.: A certified digital signature. In: G. Brassard (ed.) Advances in Cryptology - CRYPTO 89 Proceedings, Lecture Notes in Computer Science, vol. 435, pp. 218–238. Springer New York (1990). DOI 10.1007/0-387-34805-021. URL http://dx.doi.org/10.1007/0-387-34805-0_21
Rath, N.: http://www.rath.org/s3ql-docs/impl_details.html (access:07/19/2013)
Zhou, J., Gollman, D.: A fair non-repudiation protocol. In: Security and Privacy, 1996. Proceedings, 1996 IEEE Symposium on, pp. 55–61 (May). DOI 10.1109/SECPRI.1996.502669
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Pöppke, T., Achenbach, D. (2014). ReDS: A System for Revision-Secure Data Storage. In: Krcmar, H., Reussner, R., Rumpe, B. (eds) Trusted Cloud Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-12718-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-12718-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12717-0
Online ISBN: 978-3-319-12718-7
eBook Packages: Computer ScienceComputer Science (R0)