Authors
Naveen Kumar, Anish Mathuria
Publication date
2017/1/5
Book
Proceedings of the 18th International Conference on Distributed Computing and Networking
Pages
1-8
Description
In secure data outsourcing, even a single unauthorized write operation may heavily ruin the data owner's business operations. Another potential issue is that the untrusted service provider may return stale data to mislead the readers. Existing work on secure write access does not consider misbehavior by users with write authorization to the outsourced data files. The data owner may not wish to allow such users to modify their own written data files after a fixed amount of time. The other type of misbehavior is that a user with revoked access to a resource can modify corresponding latest versions of the resource written by him in collusion with the service provider. Also, the weak freshness guarantee (i.e., the < k, t >-staleness) is not appropriate in many time-sensitive applications.
In this work, we address the misbehavior by users who attempt to modify the own written data files. Such misbehavior is detected by the data …
Total citations
2020202120222023202412121
Scholar articles
N Kumar, A Mathuria - Proceedings of the 18th International Conference on …, 2017