Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1267569.1267578guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A revocable backup system

Published: 22 July 1996 Publication History

Abstract

We present a system which enables a user to remove a file from both the file system and all the backup tapes on which the file is stored. The ability to remove files from all backup tapes is desirable in many cases. Our system erases information from the backup tape without actually writing on the tape. This is achieved by applying cryptography in a new way: a block cipher is used to enable the system to "forget" information rather than protect it. Our system is easy to install and is transparent to the end user. Further, it introduces no slowdown in system performance and little slowdown in the backup procedure.

References

[1]
{1} S. Bellovin, private communications.
[2]
{2} M. Blaze, "A Cryptographic File System for Unix", available at http://www.cert-kr.or.kr/ doc/Crypto-File-System.ps.asc.html
[3]
{3} C. Kaufman, R. Perlman, M. Speciner, "Network Security", Prentice Hall, 1995.
[4]
{4} A. Shamir, "How to share a secret", CACM, Vol. 22, Nov. 1979, pp. 612-613.

Cited By

View all
  • (2024)Project Silica: Towards Sustainable Cloud Archival Storage in GlassACM Transactions on Storage10.1145/370899621:1(1-31)Online publication date: 31-Dec-2024
  • (2021)Software-defined data protectionProceedings of the VLDB Endowment10.14778/3450980.345098614:7(1167-1174)Online publication date: 12-Apr-2021
  • (2020)EvanescoProceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3373376.3378490(1311-1326)Online publication date: 9-Mar-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
SSYM'96: Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
July 1996
189 pages

Sponsors

  • UniForum
  • USENIX Assoc: USENIX Assoc

Publisher

USENIX Association

United States

Publication History

Published: 22 July 1996

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Project Silica: Towards Sustainable Cloud Archival Storage in GlassACM Transactions on Storage10.1145/370899621:1(1-31)Online publication date: 31-Dec-2024
  • (2021)Software-defined data protectionProceedings of the VLDB Endowment10.14778/3450980.345098614:7(1167-1174)Online publication date: 12-Apr-2021
  • (2020)EvanescoProceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3373376.3378490(1311-1326)Online publication date: 9-Mar-2020
  • (2018)Forgetting with PuzzlesProceedings of the Eighth ACM Conference on Data and Application Security and Privacy10.1145/3176258.3176327(342-353)Online publication date: 13-Mar-2018
  • (2018)Blockchain-based publicly verifiable data deletion scheme for cloud storageJournal of Network and Computer Applications10.1016/j.jnca.2017.11.011103:C(185-193)Online publication date: 1-Feb-2018
  • (2017)Forward and Backward Private Searchable Encryption from Constrained Cryptographic PrimitivesProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security10.1145/3133956.3133980(1465-1482)Online publication date: 30-Oct-2017
  • (2017)The Design and Implementation of a Rekeying-Aware Encrypted Deduplication Storage SystemACM Transactions on Storage10.1145/303296613:1(1-30)Online publication date: 25-Feb-2017
  • (2016)TPRIVEXECProceedings of the Sixth ACM Conference on Data and Application Security and Privacy10.1145/2857705.2857724(285-294)Online publication date: 9-Mar-2016
  • (2016)NeuralyzerProceedings of the Sixth ACM Conference on Data and Application Security and Privacy10.1145/2857705.2857714(14-25)Online publication date: 9-Mar-2016
  • (2016)TrueEraseACM Transactions on Storage10.1145/285488212:4(1-37)Online publication date: 20-May-2016
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media