Advertisement

Techniques to Certify Integrity and Proof of Existence for a Periodical Re-encryption-Based Long-Term Archival Systems

  • A. H. Shanthakumara
  • N. R. Sunitha
Conference paper

Abstract

The periodical re-encryption-based archival systems have many specific characteristics such as actively re-encrypting the stored data objects periodically with or without conscious to the owner. For such a system, traditional techniques cannot be applied to check the integrity and proof of existence of a data object. For example, most traditional systems check integrity and proof of existence by comparing hash value of a data object stored in the archival system to the corresponding hash value with the owner. It may not be realistic solution due to continuous change in the bit patterns of the archivals due to periodical re-encryption. Therefore, we present a solution that is not only suitable to a specific periodical re-encryption-based archival system but also to any existing storage systems from long-term point of view.

Keywords

Certify Integrity Proof of Existence Archival Systems 

References

  1. 1.
    Baker, M., Shah, M., Rosenthal, D.S.H., Roussopoulos, M., Maniatis, P., Giuli, T., Bungale, P.: A fresh look at the reliability of long-term digital storage. In: Proceedings of EuroSys 2006, pp. 221–234, April 2006Google Scholar
  2. 2.
    Bayer, D., Haber, S., Stornetta, W.: Improving the efficiency and reliability of digital time-stamping. In: Sequences II: Methods in Communication, Security, and Computer Science, pp. 329–334. Springer, Berlin (1993)CrossRefGoogle Scholar
  3. 3.
    Benaloh, J., de Mare, M.: One way accumulators, a decentralized alternative to digital signatures. In: Advances in Cryptology - EUROCRYPT ’93, LNCS 765, pp. 274–285. Springer, Berlin (1994)CrossRefGoogle Scholar
  4. 4.
    Centre of Registers and Information Systems: e-Land Register. http://www.egov-estonia.eu/e-land-register. Accessed 20 Jan 2015
  5. 5.
    Cohen, W.: Enron email dataset. http://www.cs.cmu.edu/~enron. Accessed 20 Jan 2015
  6. 6.
    Gamal, T.E.: On computing logarithms over finite fields. In: Williams, H.C. (ed.) CRYPTO. Lecture Notes in Computer Science, vol. 218, pp. 396–402. Springer, Berlin (1985)Google Scholar
  7. 7.
    Giuli, P., Maniatis, P., Giuli, T., Baker, M.: Enabling the long-term archival of signed documents through time stamping. In: Proceedings of the 1st USENIX Conference on File and Storage Technologies. FAST ’02, USENIX Association, pp. 31–46 (2002)Google Scholar
  8. 8.
    Gondrom, T., Brandner, R., Pordesch, U.: Evidence Record Syntax (ERS) Securing Electronic Business Processes, in RFC 4998, pp 367–375 (2007)Google Scholar
  9. 9.
    Goodrich, M., Tamassia, R., Hasic, J.: An efficient dynamic and distributed cryptographic accumulator. In: Proceedings of Information Security Conference (ISC). Lecture Notes in Computer Science, vol. 2243 , pp. 372–388. Springer, Brelin (2002)Google Scholar
  10. 10.
    Haber, S.: Content integrity service for long-term digital archives. In: Archiving 2006, pp. 159–164. IS&T, Ottawa (2006)Google Scholar
  11. 11.
    Haber, S., Stornetta,W.S.: How to time-stamp a digital document. J. Cryptol. 3(2), 99–111 (1991)CrossRefGoogle Scholar
  12. 12.
    Haber, S., Kamat, P., Kamineni, K.: A content integrity service for digital repositories. In: 3rd international conference on open Repositories, Southamton, UK (2008).Google Scholar
  13. 13.
    Johnson, D., Menezes, A., Vanstone, S.A.: The elliptic curve digital signature algorithm (ecdsa). Int. J. Inf. Sec. 1(1), 36–63 (2001)CrossRefGoogle Scholar
  14. 14.
    Mao, W.: Modern Cryptography Theory and Practice. Hewlett Packard Professional Books, 1st edn. Prentice Hall, Upper Saddle River (2006)Google Scholar
  15. 15.
    Martin, A., Gagliotti, V., Daniel, C., Alexander, W., Johannes, B.: Authenticity, integrity and proof-of-existence for long-term archiving: a survey. IACR Cryptology ePrint Archive, p. 499 (2012)Google Scholar
  16. 16.
    Martin, A.G. Vigil, Moecke, C.T., Custdio, R.F., Volkamer, M.: The Notary Based PKI A Lightweight PKI for Long-Term Signatures on Documents. Public Key Infrastructures, Services and Applications. Lecture Notes in Computer Science, vol. 7868, pp. 85–97. Springer, Berlin (2013)Google Scholar
  17. 17.
    Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) Advances in Cryptology - CRYPTO ’89. Lecture Notes in Computer Science, vol. 435, pp. 218–238. Springer, Berlin (1989)Google Scholar
  18. 18.
    Ministere de la Justice: Livre Foncier. https://www.livrefoncier.fr. Accessed 20 Jan 2015
  19. 19.
    Oprea, A., Bowers, K.D.: Authentic time-stamps for archival storage. IACR Cryptology ePrint Archive 2009, p. 306 (2009)Google Scholar
  20. 20.
    RFP for Scanning and Digitization of Records of High Court of Himachal Pradesh. http://hphighcourt.nic.in/pdf/TenderDigitiz21112014.pdf. Accessed 20 Jan 2015
  21. 21.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Sangchul, S., Joseph, J.: Techniques to audit and certify the long-term integrity of digital archives. Int. J. Digit. Libr. 10(2–3), 123–131 (2009)Google Scholar
  23. 23.
    Shanthakumara, A.H., Sunitha, N.R.: A novel archival system with dynamically balanced security, reliability and availability. In: 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), Bangalore, pp. 27–33. IEEE (2016).  https://doi.org/10.1109/CSITSS.2016.7779435
  24. 24.
    Storer, M.W., Greenan, K.M., Miller, E.L.: Long term threats to secure archives. In: Proceedings of the 2006 ACM Workshop on Storage Security and Survivability (2006)Google Scholar
  25. 25.
    Troncoso, C., De Cock, D., Preneel, B.: Improving secure long-term archival of digitally signed documents. In: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability. StorageSS ’08, pp. 27–36. ACM, New York (2008)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • A. H. Shanthakumara
    • 1
  • N. R. Sunitha
    • 1
  1. 1.Siddaganga Institute of TechnologyTumakuruIndia

Personalised recommendations