HAIL
- 9 November 2009
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- Vol. 2008, 187-198
- https://doi.org/10.1145/1653662.1653686
Abstract
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and retrievable. HAIL strengthens, formally unifies, and streamlines distinct approaches from the cryptographic and distributed-systems communities. Proofs in HAIL are efficiently computable by servers and highly compact---typically tens or hundreds of bytes, irrespective of file size. HAIL cryptographically verifies and reactively reallocates file shares. It is robust against an active, mobile adversary, i.e., one that may progressively corrupt the full set of servers. We propose a strong, formal adversarial model for HAIL, and rigorous analysis and parameter choices. We show how HAIL improves on the security and efficiency of existing tools, like Proofs of Retrievability (PORs) deployed on individual servers. We also report on a prototype implementation.Keywords
This publication has 16 references indexed in Scilit:
- Proofs of Retrievability via Hardness AmplificationLecture Notes in Computer Science, 2009
- Compact Proofs of RetrievabilityLecture Notes in Computer Science, 2008
- Provable data possession at untrusted storesPublished by Association for Computing Machinery (ACM) ,2007
- Verifying distributed erasure-coded dataPublished by Association for Computing Machinery (ACM) ,2007
- Asynchronous Veri.able Information DispersalPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Optimal Error Correction Against Computationally Bounded NoiseLecture Notes in Computer Science, 2005
- Asynchronous verifiable secret sharing and proactive cryptosystemsPublished by Association for Computing Machinery (ACM) ,2002
- Secure distributed storage and retrievalTheoretical Computer Science, 2000
- Proactive public key and signature systemsPublished by Association for Computing Machinery (ACM) ,1997
- New hash functions and their use in authentication and set equalityJournal of Computer and System Sciences, 1981