Abstract
Secure archiving of authenticated and sensitive documents is becoming a necessity due to the dematerialization of paper based documents and processes. Huhnlein et al. combined the Open Archival Information System (OAIS) Reference Model, Evidence Record Syntax (ERS) with Secret Sharing and proposed the Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data. However, their proposal requires the secret reconstruction and redistribution whenever there are changes in the structure of the servers. In addition, there are some unhandled problems (e.g. compromise of the servers) and open issues (e.g. specification of a protocol) in their proposal. In this article we propose the use of a modified version of Gupta’s and Gopinath’s protocol G\(_{its}^{2}\) Verifiable Secret Redistribution (VSR), among other mechanisms, in order to improve the reference architecture, making it suitable for long-term archiving.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adya, A., Bolosky, W.J., Castro, M., Cermak, G., Chaiken, R., Douceur, J.R., Howell, J., Lorch, J.R., Theimer, M., Wattenhofer, R.P.: Farsite: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment. Operating Systems Design and Implementation (2002)
Beagrie, N., Jones, M.: Preservation Management of Digital Materials: The Handbook. Digital Preservation Coalition (2002)
Blazic, A.: Long Term Trusted Archive Services. In: First International Conference on the Digital Society (ICDS 2007), pp. 29–29 (2007)
Borghoff, U., Rödig, P., Scheffczyk, J., Schmitz, L.: Long-term Preservation of Digital Documents: Principles and Practices (2006)
Brandner, R., Pordesch, U.: Long-term conservation of provability of electronically signed documents. Beitrag zu ISSE, pp. 2–5 (2002)
Brandner, R., Pordesch, U., Gondrom, T.: Evidence Record Syntax (ERS). Internet Engineering Task Force (IETF) Networking Group, Request for Comments 4998 (2007)
Desmedt, Y., Jajodia, S.: Redistributing Secret Shares to New Access Structures and its Applications (1997)
Druschel, P., Rowstron, A.: PAST: a Large-scale, Persistent Peer-to-Peer Storage Utility. In: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, 2001, pp. 75–80 (2001)
European Telecommunications Standards Institute: Electronic Signatures and Infrastructures (ESI); CMS Advanced Electronic Signatures (CAdES) (November 2009)
European Telecommunications Standards Institute: Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES) (June 2009)
Feldman, P.: A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In: 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp. 427–438 (October 1987)
Gupta, V.H., Gopinath, K.: G\(_{its}^{2}\) VSR: An Information Theoretical Secure Verifiable Secret Redistribution Protocol for Long-Term Archival Storage. In: Fourth International IEEE Security in Storage Workshop, pp. 22–33 (2007)
Gupta, V., Gopinath, K.: An Extended Verifiable Secret Redistribution Protocol for Archival Systems. IEEE, Los Alamitos (2006)
Haber, S., Stornetta, W.: How to Time-Stamp a Digital Document. Journal of Cryptology 3(2), 99–111 (1991)
Haeberlen, A., Mislove, A., Druschel, P.: Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, vol. 2 (2005)
Herzberg, A., Krawczyk, H., Yung, M.: Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. IBM TJ. Watson Research Center, 1–22 (1995)
Huhnlein, D., Korte, U., Langer, L., Wiesmaier, A.: A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data. In: 2009 3rd International Conference on New Technologies, Mobility and Security, pp. 1–5 (December 2009)
ISO: ISO/IEC 14721:2003: Space Data and Information Transfer Systems — Open Archival Information System — Reference Model. International Standardization Organization, Geneva, Switzerland (2003)
Kotla, R., Alvisi, L., Dahlin, M.: SafeStore: a Durable and Practical Storage System. In: 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference (2007)
Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: OceanStore: an Architecture for Global-Scale Persistent Storage. ACM SIGPLAN Notices 35(11) (2000)
Merkle, R.C.: Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy, vol. 0, p. 122 (1980)
Miyamoto, T., Doi, S., Nogawa, H., Kumagai, S.: Autonomous Distributed Secret Sharing Storage System. Systems and Computers in Japan 37(6), 55–63 (2006)
Nikov, V., Nikova, S.: On proactive secret sharing schemes. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 308–325. Springer, Heidelberg (2004)
Pedersen, T.P.: Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)
Pinkas, D., Pope, N., Ross, J.: CMS Advanced Electronic Signatures (CAdES). Internet Engineering Task Force (IETF) Networking Group, Request for Comments 5126 (2008)
Pinkas, D., Ross, J., Pope, N.: Electronic Signature Formats for Long Term Electronic Signatures. Internet Engineering Task Force (IETF) Networking Group, Request for Comments 3126 (2001)
Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)
Storer, M.W., Greenan, K.M., Miller, E.L., Voruganti, K.: POTSHARDS—a secure, recoverable, long-term archival storage system. ACM Transactions on Storage 5(2), 1–35 (2009)
Wallace, C., Pordesch, U., Brandner, R.: Long-term Archive Service Requirements. Internet Engineering Task Force (IETF) Networking Group, Request for Comments 4810 (2007)
Wang, E., Yau, J., Hui, L., Jiang, Z., Yiu, S.: A Key-Recovery System for Long-term Encrypted Documents. IEEE, Los Alamitos (2006)
Wong, T., Wing, J.: Verifiable Secret Redistribution for Archive Systems. In: Proceedings of First International IEEE Security in Storage Workshop, 2002, pp. 94–105 (December 2002)
Zimmer, W., Langkabel, T., Hentrich, C.: ArchiSafe: Legally Compliant Electronic Storage. IT Professional 10(4), 2633 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ramos, T.A., da Silva, N., Lung, L.C., Kohler, J.G., Custódio, R.F. (2011). An Infrastructure for Long-Term Archiving of Authenticated and Sensitive Electronic Documents. In: Camenisch, J., Lambrinoudakis, C. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2010. Lecture Notes in Computer Science, vol 6711. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22633-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-22633-5_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22632-8
Online ISBN: 978-3-642-22633-5
eBook Packages: Computer ScienceComputer Science (R0)