Award Abstract # 0716532
CT-ISG: COLLABORATIVE RESEARCH: SecureWORM: Strong Regulatory-Compliant Storage

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF ILLINOIS
Initial Amendment Date: August 6, 2007
Latest Amendment Date: June 15, 2009
Award Number: 0716532
Award Instrument: Continuing Grant
Program Manager: Jeremy Epstein
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: August 1, 2007
End Date: July 31, 2012 (Estimated)
Total Intended Award Amount: $250,000.00
Total Awarded Amount to Date: $256,000.00
Funds Obligated to Date: FY 2007 = $100,000.00
FY 2008 = $106,000.00

FY 2009 = $50,000.00
History of Investigator:
  • Marianne Winslett (Principal Investigator)
    winslett@illinois.edu
Recipient Sponsored Research Office: University of Illinois at Urbana-Champaign
506 S WRIGHT ST
URBANA
IL  US  61801-3620
(217)333-2187
Sponsor Congressional District: 13
Primary Place of Performance: University of Illinois at Urbana-Champaign
506 S WRIGHT ST
URBANA
IL  US  61801-3620
Primary Place of Performance
Congressional District:
13
Unique Entity Identifier (UEI): Y8CWNJRCNN91
Parent UEI: V2PHZ2CSCH63
NSF Program(s): CYBER TRUST,
TRUSTWORTHY COMPUTING
Primary Program Source: app-0107 
01000809DB NSF RESEARCH & RELATED ACTIVIT

01000910DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 9178, 9218, 9251, HPCC
Program Element Code(s): 737100, 779500
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Digital societies and markets increasingly mandate consistent procedures for the access, processing and storage of information. In the United States alone, over 10,000 such regulations can be found in financial, life sciences, health-care and government sectors, including the Gramm-Leach-Bliley Act, Health Insurance Portability and Accountability Act, and Sarbanes-Oxley Act. A recurrent theme in these regulations is the need for regulatory-compliant storage as an underpinning to ensure data confidentiality, access integrity and authentication; provide audit trails, guaranteed deletion, and data migration; and deliver Write Once Read Many
(WORM) assurances, essential for enforcing long-term data retention and life-cycle policies.

Unfortunately, current compliance storage WORM mechanisms are fundamentally vulnerable to faulty behavior or insiders with incentives to alter stored data because they rely on simple enforcement primitives such as software and/or hardware device-hosted on/off switches, ill-suited to their target threat model.

In this project, we will build a strongly compliant storage system for realistic adversarial settings, delivering guaranteed document retention and deletion, quick lookup, and compliant migration, together with support for litigation holds and several key aspects of data confidentiality.

Recent compliance regulations are intended to foster and restore humans trust in digital information records and, more broadly, in our businesses, hospitals, and educational enterprises. As increasing amounts of information are created and live digitally, compliance storage will be a vital tool in restoring this trust and ferreting out corruption and data abuse at all levels of society. This project will greatly advance the state of the art and create a strong foundation for secure regulatory compliant designs.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Mitra, S; Winslett, M; Hsu, WW; Chang, KCC "Trustworthy keyword search for compliance storage" VLDB JOURNAL , v.17 , 2008 , p.225 View record at Web of Science 10.1007/s00778-007-0069-
Ragib Hasan, Radu Sion, and Marianne Winslett "Preventing History Forgery with Secure Provenance" ACM Transactions on Storage , v.5 , 2009 , p.12:1
Ragib Hasan, Radu Sion, and Marianne Winslett "Secure Provenance: Protecting the Genealogy of Bits" USENIX ;login: magazine , v.3 , 2009 , p.1
Ragib Hasan, Radu Sion, Marianne Winslett "Preventing history forgery with secure provenance" ACM Transactions on Storage (TOS) , v.5 , 2013 , p.1-12
Ragib Hasan, Radu Sion, Marianne Winslett "Secure provenance: protecting the genealogy of bits" USENIX ;login , v.3 , 2013 , p.1-21
Soumyadeb Mitra, Marianne Winslett, Windsor W. Hsu, Kevin C. C. Chang "Trustworthy keyword search for compliance storage" The Very Large Databases Journal (VLDBJ) , v.17 , 2013 , p.225-250

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page