26.08.2016 Views

trademark

2c2kIhh

2c2kIhh

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3.0 Secure Data Storage and Transactions Logs (cont.)<br />

3.3 Employ SUNDR<br />

3.3.1 Why?<br />

To store data securely on untrusted servers<br />

3.3.2 How?<br />

Use SUNDR (secure untrusted data repository) to detect any attempts at unauthorized file<br />

modification by malicious server operators or users. It is also effective to detect integrity or<br />

consistency failures in visible file modifications using fork consistency.<br />

3.4 Use broadcast encryption<br />

3.4.1 Why?<br />

To improve scalability.<br />

3.4.2 How?<br />

Use broadcast encryption scheme [FN 93] in which a broadcaster encrypts a message<br />

for some subset S of users who are listening on a broadcast channel. Any user in S<br />

can use a private key to decrypt the broadcast. However, even if all users outside of<br />

S collude, they can obtain no information about the content of the broadcast. Such<br />

systems are said to be collusion resistant. The broadcaster can encrypt to any subset S<br />

of his choice. It may still be possible that some members of S may contribute to piracy<br />

by constructing a pirate decoder using private keys assigned to them. To ascertain the<br />

identities of such malicious members—and thereby discourage piracy—traitor-tracing<br />

mechanisms should be implemented as well.<br />

CLOUD SECURITY ALLIANCE Big Data Working Group Guidance<br />

© Copyright 2016, Cloud Security Alliance. All rights reserved.<br />

18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!