Secure and private backup storage and processing for trusted computing and data services

作者: Rahul V. Auradkar , Roy Peter D'Souza

DOI:

关键词:

摘要: A digital escrow pattern is provided for backup data services including searchable encryption techniques data, such as synthetic full stored at remote site or in a cloud service, distributing trust across multiple entities to avoid single point of compromise. In one embodiment, an operational maintained with encrypted service cryptographically secure manner that addresses integrity and privacy requirements external storage potentially sensitive data. The supported include backup, protection, disaster recovery, analytics on second copies primary device Some examples cost-effective cryptographic can be applied facilitate establishing high level over security include, but are not limited to, size-preserving encryption, searchable-encryption, Proof Application, blind fingerprints, Retrievability, others.

参考文章(22)
Duane J. Linsenbardt, John N. Young, William Reid Carlisle, Robert R. Jueneman, Burton George Tregub, Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption ,(2008)
Arun Prasad Amarendran, Rajiv Kottomtharayil, Retnamma Manoj Kumar Vijayan, System and method for providing encryption in pipelined storage operations in a storage network ,(2004)
Joel H. Stave, John B. Yeaman, Richard A. Lagueux, Brian E. Stevens, Robert M. Higgins, James M. Collins, Graphical user interface for configuration of a storage system ,(1999)
Rahul V. Auradkar, Roy Peter D'souza, Trusted cloud computing and services framework ,(2010)
Arun Amarendran, Rajiv Kottomtharayil, Manoj Vijayan Retnamma, Mahesh Tyagarajan, Paul Ignatius, Anand Prahlad, System and method for providing encryption in a storage network by storing a secured encryption key with encrypted archive data in an archive storage device ,(2004)
Philippe Golle, Jessica Nicola Staddon, Brent Waters, System and method for performing a conjunctive keyword search over encrypted data ,(2004)
Mark W. Eichin, Yonah Schmeidler, David J. Rostcheck, Derek Atkins, Method and apparatus for secure content delivery over broadband access networks ,(1999)