Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/HPCC.2014.151guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Performance Analysis of Long-Term Archiving Techniques

Published: 20 August 2014 Publication History

Abstract

A challenge for digital archives managing long lived data, such as medical records and land registers, is to guarantee long-term authenticity, integrity, and datedness. Although some techniques have been proposed that provide these security goals, most proposals lack a corresponding performance analysis. Thus, in this paper we provide an analytical analysis of the performance of several proposals. Following, to see the impact of different approaches on the runtime, we implemented the most promising schemes and compared them with respect to their required storage space and verification time. Furthermore, the identified computational bottlenecks of the techniques are presented and corresponding improvements are indicated. Finally, we show how to select a long-term archiving scheme and the appropriate key sizes based on trust assumptions and the number of documents to be archived.

Cited By

View all
  • (2019)Integrity, authenticity, non-repudiation, and proof of existence for long-term archivingComputers and Security10.1016/j.cose.2014.12.00450:C(16-32)Online publication date: 1-Jan-2019
  • (2017)MoPSProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security10.1145/3052973.3053025(436-448)Online publication date: 2-Apr-2017
  1. A Performance Analysis of Long-Term Archiving Techniques

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    HPCC '14: Proceedings of the 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS)
    August 2014
    1304 pages
    ISBN:9781479961238

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 20 August 2014

    Author Tags

    1. CIS
    2. ERS
    3. XAdES
    4. archive
    5. authenticity
    6. datedness
    7. efficiency
    8. existence
    9. integrity
    10. long-term
    11. notarization
    12. performance
    13. times-tamping

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 23 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Integrity, authenticity, non-repudiation, and proof of existence for long-term archivingComputers and Security10.1016/j.cose.2014.12.00450:C(16-32)Online publication date: 1-Jan-2019
    • (2017)MoPSProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security10.1145/3052973.3053025(436-448)Online publication date: 2-Apr-2017

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media