Sonstige Schriften
Refine
Document Type
- Conference Proceeding (21) (remove)
Is part of the Bibliography
- no (21)
Keywords
- Jugend-Check (1)
Institute
- Lehrstuhl für Verwaltungswissenschaft und öffentliches Recht (Univ.-Prof. Dr. Hermann Hill) (2)
- Lehrstuhl für Verwaltungswissenschaft, Staatsrecht, Verwaltungsrecht und Europarecht (Univ.-Prof. Dr. Mario Martini) (2)
- Lehrstuhl für Öffentliches Recht, Staatslehre und Rechtsvergleichung (Univ.-Prof. Dr. Dr. h.c. Karl-Peter Sommermann) (2)
- Lehrstuhl für Öffentliches Recht, insbesondere Europarecht und Völkerrecht (Univ.-Prof. Dr. Wolfgang Weiß) (2)
- Lehrstuhl für öffentliches Recht, insbesondere allgemeines und besonderes Verwaltungsrecht (Univ.-Prof. Dr. Jan Ziekow) (2)
- Lehrstuhl für Öffentliches Recht, insbesondere deutsches und europäisches Verwaltungsrecht (Univ.-Prof. Dr. Ulrich Stelkens) (1)
European Banking Union
(2016)
Technologies for the IoT have reached a high level of maturity, and a largescale deployment will soon be possible. For the IoT to become an economic success, easy access to all kinds of real-world information must be enabled. Assuming that not all services will be available for free, an IoT infrastructure should support access control, accounting, and billing. We analyze available access control and payment schemes for their potential as payment schemes in the IoT. In addition to security and privacy, we discuss suitability for direct client to sensor communication and efficiency.
We show shortcomings of existing protocols that need to be addressed by future research.
The importance of frequent backups is uncontroversial. Their creation is simpler than ever today thanks to widespread availability of cheap cloud storage. Common backup solutions, however, tend to be either insecure, inflexible or inefficient in typical backup scenarios.
In this paper, we present triviback, a lightweight and almost trivial, yet powerful solution for outsourcing backups to untrusted cloud storage. Based on recent research results on secure data deduplication, triviback combines strong confidentiality, authenticity and availability guarantees with flexibility and efficiency in terms of low storage and communication costs: Triviback supports efficient preservation of many backup states with storage costs comparable to state-of-the-art version control systems-while supporting full storage reclamation on deletion of arbitrary backup states.
We discuss its security, publish an implementation and perform an extensive evaluation of storage and communication costs.
We present sec-cs, a hash-table-like data structure for contents on untrusted storage that is provably secure and storage-efficient. We achieve authenticity and confidentiality with zero storage overhead using deterministic authenticated encryption. State-of-the-art data deduplication approaches prevent redundant storage of shared parts of different contents irrespective of whether relationships between contents are known a priori.
Instead of just adapting existing approaches, we introduce novel (multi-level) chunking strategies, ML-SC and ML-CDC, which are significantly more storage-efficient than existing approaches in presence of high redundancy.
We prove sec-cs's security, publish an implementation, and present evaluation results indicating suitability for, e.g., future backup systems that should preserve many versions of files on little available storage.