By Topic

Hash Tree Based Integrity Protection Appropriate for Disk

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Fangyong Hou ; Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China ; Hongjun He ; Nong Xiao

Optimized hash tree based approach is proposed here to provide disk integrity protection with fine performance and consistency. By constructing a hash tree on the protected space and creating hash tree leaf nodes from disk sectors directly, it can provide integrity with characteristics like online checking, any data protection, unified low-level mechanism and resistance against any attacks. To make performance and cost acceptable, it defines hash sub-trees corresponding to the frequently accessed disk regions as hot-access-windows to quicken integrity checking processes. At the same time, its regularity is convenient for maintaining consistency required by disk storage. Related mode and approach are elaborated, as well as testing results. Theoretical analysis and experimental simulation show that it is a practical and available way to protect disk data against tampering.

Published in:

Information Engineering, 2009. ICIE '09. WASE International Conference on  (Volume:2 )

Date of Conference:

10-11 July 2009