SYSTEM AND METHOD FOR EFFICIENT TRUST PRESERVATION IN DATA STORES
First Claim
Patent Images
1. A method for preserving trustworthiness of data, the method comprising:
- storing data on an untrusted system; and
committing the data to a trusted computing base (TCB), wherein said committing comprises;
upon an end of a predetermined time interval, transmitting a constant size authentication data from the untrusted system to the TCB; and
the TCB preserving trustworthiness of the authentication data based on performing a single hash operation of a first root and a second root of a general hash tree representing authenticated data.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides a method and system for preserving trustworthiness of data, the method includes storing data on an untrusted system, and committing the data to a trusted computing base (TCB). The committing includes upon an end of a predetermined time interval, transmitting a constant size authentication data from the untrusted system to the TCB, and the TCB preserving trustworthiness of the authentication data based on performing a single hash operation of a first root and a second root of a general hash tree representing authenticated data.
-
Citations
20 Claims
-
1. A method for preserving trustworthiness of data, the method comprising:
-
storing data on an untrusted system; and committing the data to a trusted computing base (TCB), wherein said committing comprises; upon an end of a predetermined time interval, transmitting a constant size authentication data from the untrusted system to the TCB; and the TCB preserving trustworthiness of the authentication data based on performing a single hash operation of a first root and a second root of a general hash tree representing authenticated data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for preserving trustworthiness of data, comprising:
-
at least one untrusted module configured to store data; and a trusted computing base (TCB) module coupled to the untrusted module, the TCB configured to authenticate the data, wherein upon an end of a predetermined time interval, the untrusted module transmits a constant size authentication data to the TCB for commitment, and the TCB preserves trustworthiness of the authentication data based on performing a single hash operation of a first root and a second root of a general hash tree representing authenticated data. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer program product for preserving trustworthiness of data comprising a computer usable medium including a computer readable program, wherein the computer readable program when executed on a computer causes the computer to:
-
store data on an untrusted system; and commit the data to a trusted computing base (TCB), wherein said commit further causes the computer to; upon an end of a predetermined time interval, transmit constant size authentication data from the untrusted system to the TCB; and the TCB preserves trustworthiness of the authentication data based on performing a single hash operation of a first root and a second root of a general hash tree representing authenticated data. - View Dependent Claims (17, 18, 19, 20)
-
Specification