Secure content distribution using untrusted servers

Subscribers:
349,000
Published on ● Video Link: https://www.youtube.com/watch?v=U880_Zm3UjQ



Duration: 1:06:21
26 views
1


A publisher can make content available to many readers through replication on remote, untrusted computers. Yet a reader should have confidence that content is authentic, and publishers should be able to control access to content. This talk presents the design and implementation of the SFS read-only file system (SFSRO) for secure, scalable distribution of public and private content replicated using untrusted servers. SFSRO provides authenticity of single-writer, many-reader content. A publisher creates a digitally-signed database out of the contents of a source file system. Untrusted servers replicate the content, accessed by readers through a file system interface. A reader accepts only verified, authentic content --- eliminating the need to trust the distribution infrastructure. To control access to private content, a publisher encrypts content for confidentiality. This talk introduces lazy revocation and key regression to cope with the cost of distributing keys to readers. These techniques allow a publisher on a low-bandwidth connection to support many readers accessing private content.




Other Videos By Microsoft Research


2016-09-05Program Analysis with Binary Decision Diagrams
2016-09-05Making Wireless LANs Faster and Fairer
2016-09-05More Than Human : Embracing the Promise of Biological Enhancement
2016-09-05Using Open Specifications for XML Web Services to Build Maintainable & Secure Health Care Systems
2016-09-05Source Code Evolution with Interactive Transformations
2016-09-05Is Linux Maintainable?
2016-09-05Pastiche: decentralized, low-cost backup using untrusted, Internet storage
2016-09-05Measurement-driven Modeling and Design of Internet-scale Systems [1/2]
2016-09-05Distributed hash tables for large-scale cooperative applications
2016-09-05Talk 1: Convergence research in the UK; Talk 2: Artistic rendering in the convergence area
2016-09-05Secure content distribution using untrusted servers
2016-09-05Gadgets for good: How computer researchers can help save lives in poor countries
2016-09-05Inferring Information Status for Reference Generation in Open Domains [1/12]
2016-09-05Improving the Reliability of Commodity Operating Systems [1/2]
2016-09-05Mentoring: The People Who Lead Us Toward Our Purpose in Life
2016-09-05Data Structure Repair
2016-09-05The neurophysiology of decision making: rate differences and log likelihood ratios
2016-09-05Can Parallel Computing Finally Impact Mainstream Computing?
2016-09-05Making Networks More Robust
2016-09-05Routing Tradeoffs in Dynamic Peer-to-peer Networks
2016-09-05Enhancing Security of Real-World Systems with a Better Understanding of the Threats



Tags:
microsoft research