Efficient Storage Integrity in Adversarial Settings

  • Quinn Burke
  • , Ryan Sheatsley
  • , Yohan Beugin
  • , Eric Pauley
  • , Owen Hines
  • , Michael Swift
  • , Patrick McDaniel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Storage integrity is essential to systems and applications that use untrusted storage (e.g., public clouds, end-user devices). However, known methods for achieving storage integrity either suffer from high (and often prohibitive) overheads or provide weak integrity guarantees. In this work, we demonstrate a hybrid approach to storage integrity that simultaneously reduces overhead while providing strong integrity guarantees. Our system, partially asynchronous integrity checking (PAC), allows disk write commitments to be deferred while still providing guarantees around read integrity. PAC delivers a 5.5 × throughput and latency improvement over the state of the art, and 85% of the throughput achieved by non-integrity-assuring approaches. In this way, we show that untrusted storage can be used for integrity-critical workloads without meaningfully sacrificing performance.

Original languageEnglish (US)
Title of host publicationProceedings - 46th IEEE Symposium on Security and Privacy, SP 2025
EditorsMarina Blanton, William Enck, Cristina Nita-Rotaru
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages3145-3160
Number of pages16
ISBN (Electronic)9798331522360
DOIs
StatePublished - 2025
Event46th IEEE Symposium on Security and Privacy, SP 2025 - San Francisco, United States
Duration: May 12 2025May 15 2025

Publication series

NameProceedings - IEEE Symposium on Security and Privacy
ISSN (Print)1081-6011

Conference

Conference46th IEEE Symposium on Security and Privacy, SP 2025
Country/TerritoryUnited States
CitySan Francisco
Period5/12/255/15/25

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Efficient Storage Integrity in Adversarial Settings'. Together they form a unique fingerprint.

Cite this