Skip to main content

An Infrastructure for Long-Term Archiving of Authenticated and Sensitive Electronic Documents

  • Conference paper
Book cover Public Key Infrastructures, Services and Applications (EuroPKI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6711))

Included in the following conference series:

  • 570 Accesses

Abstract

Secure archiving of authenticated and sensitive documents is becoming a necessity due to the dematerialization of paper based documents and processes. Huhnlein et al. combined the Open Archival Information System (OAIS) Reference Model, Evidence Record Syntax (ERS) with Secret Sharing and proposed the Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data. However, their proposal requires the secret reconstruction and redistribution whenever there are changes in the structure of the servers. In addition, there are some unhandled problems (e.g. compromise of the servers) and open issues (e.g. specification of a protocol) in their proposal. In this article we propose the use of a modified version of Gupta’s and Gopinath’s protocol G\(_{its}^{2}\) Verifiable Secret Redistribution (VSR), among other mechanisms, in order to improve the reference architecture, making it suitable for long-term archiving.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adya, A., Bolosky, W.J., Castro, M., Cermak, G., Chaiken, R., Douceur, J.R., Howell, J., Lorch, J.R., Theimer, M., Wattenhofer, R.P.: Farsite: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment. Operating Systems Design and Implementation (2002)

    Google Scholar 

  2. Beagrie, N., Jones, M.: Preservation Management of Digital Materials: The Handbook. Digital Preservation Coalition (2002)

    Google Scholar 

  3. Blazic, A.: Long Term Trusted Archive Services. In: First International Conference on the Digital Society (ICDS 2007), pp. 29–29 (2007)

    Google Scholar 

  4. Borghoff, U., Rödig, P., Scheffczyk, J., Schmitz, L.: Long-term Preservation of Digital Documents: Principles and Practices (2006)

    Google Scholar 

  5. Brandner, R., Pordesch, U.: Long-term conservation of provability of electronically signed documents. Beitrag zu ISSE, pp. 2–5 (2002)

    Google Scholar 

  6. Brandner, R., Pordesch, U., Gondrom, T.: Evidence Record Syntax (ERS). Internet Engineering Task Force (IETF) Networking Group, Request for Comments 4998 (2007)

    Google Scholar 

  7. Desmedt, Y., Jajodia, S.: Redistributing Secret Shares to New Access Structures and its Applications (1997)

    Google Scholar 

  8. Druschel, P., Rowstron, A.: PAST: a Large-scale, Persistent Peer-to-Peer Storage Utility. In: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, 2001, pp. 75–80 (2001)

    Google Scholar 

  9. European Telecommunications Standards Institute: Electronic Signatures and Infrastructures (ESI); CMS Advanced Electronic Signatures (CAdES) (November 2009)

    Google Scholar 

  10. European Telecommunications Standards Institute: Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES) (June 2009)

    Google Scholar 

  11. Feldman, P.: A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In: 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp. 427–438 (October 1987)

    Google Scholar 

  12. Gupta, V.H., Gopinath, K.: G\(_{its}^{2}\) VSR: An Information Theoretical Secure Verifiable Secret Redistribution Protocol for Long-Term Archival Storage. In: Fourth International IEEE Security in Storage Workshop, pp. 22–33 (2007)

    Google Scholar 

  13. Gupta, V., Gopinath, K.: An Extended Verifiable Secret Redistribution Protocol for Archival Systems. IEEE, Los Alamitos (2006)

    Book  Google Scholar 

  14. Haber, S., Stornetta, W.: How to Time-Stamp a Digital Document. Journal of Cryptology 3(2), 99–111 (1991)

    Article  MATH  Google Scholar 

  15. Haeberlen, A., Mislove, A., Druschel, P.: Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, vol. 2 (2005)

    Google Scholar 

  16. Herzberg, A., Krawczyk, H., Yung, M.: Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. IBM TJ. Watson Research Center, 1–22 (1995)

    Google Scholar 

  17. Huhnlein, D., Korte, U., Langer, L., Wiesmaier, A.: A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data. In: 2009 3rd International Conference on New Technologies, Mobility and Security, pp. 1–5 (December 2009)

    Google Scholar 

  18. ISO: ISO/IEC 14721:2003: Space Data and Information Transfer Systems — Open Archival Information System — Reference Model. International Standardization Organization, Geneva, Switzerland (2003)

    Google Scholar 

  19. Kotla, R., Alvisi, L., Dahlin, M.: SafeStore: a Durable and Practical Storage System. In: 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference (2007)

    Google Scholar 

  20. Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: OceanStore: an Architecture for Global-Scale Persistent Storage. ACM SIGPLAN Notices 35(11) (2000)

    Google Scholar 

  21. Merkle, R.C.: Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy, vol. 0, p. 122 (1980)

    Google Scholar 

  22. Miyamoto, T., Doi, S., Nogawa, H., Kumagai, S.: Autonomous Distributed Secret Sharing Storage System. Systems and Computers in Japan 37(6), 55–63 (2006)

    Article  Google Scholar 

  23. Nikov, V., Nikova, S.: On proactive secret sharing schemes. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 308–325. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  24. Pedersen, T.P.: Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)

    Google Scholar 

  25. Pinkas, D., Pope, N., Ross, J.: CMS Advanced Electronic Signatures (CAdES). Internet Engineering Task Force (IETF) Networking Group, Request for Comments 5126 (2008)

    Google Scholar 

  26. Pinkas, D., Ross, J., Pope, N.: Electronic Signature Formats for Long Term Electronic Signatures. Internet Engineering Task Force (IETF) Networking Group, Request for Comments 3126 (2001)

    Google Scholar 

  27. Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  28. Storer, M.W., Greenan, K.M., Miller, E.L., Voruganti, K.: POTSHARDS—a secure, recoverable, long-term archival storage system. ACM Transactions on Storage 5(2), 1–35 (2009)

    Article  Google Scholar 

  29. Wallace, C., Pordesch, U., Brandner, R.: Long-term Archive Service Requirements. Internet Engineering Task Force (IETF) Networking Group, Request for Comments 4810 (2007)

    Google Scholar 

  30. Wang, E., Yau, J., Hui, L., Jiang, Z., Yiu, S.: A Key-Recovery System for Long-term Encrypted Documents. IEEE, Los Alamitos (2006)

    Book  Google Scholar 

  31. Wong, T., Wing, J.: Verifiable Secret Redistribution for Archive Systems. In: Proceedings of First International IEEE Security in Storage Workshop, 2002, pp. 94–105 (December 2002)

    Google Scholar 

  32. Zimmer, W., Langkabel, T., Hentrich, C.: ArchiSafe: Legally Compliant Electronic Storage. IT Professional 10(4), 2633 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ramos, T.A., da Silva, N., Lung, L.C., Kohler, J.G., Custódio, R.F. (2011). An Infrastructure for Long-Term Archiving of Authenticated and Sensitive Electronic Documents. In: Camenisch, J., Lambrinoudakis, C. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2010. Lecture Notes in Computer Science, vol 6711. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22633-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22633-5_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22632-8

  • Online ISBN: 978-3-642-22633-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics