Papers by Aniello Del Sorbo
Network Security Sk-DNSSEC: an alternative to the Public Key scheme Syncfiles: a secure file sharing service for Linux
Lecture Notes in Computer Science, 2007
In this paper we describe a primitive, which we call, Certified Information Access, in which a da... more In this paper we describe a primitive, which we call, Certified Information Access, in which a database answers to a query by providing the information matching the query along with a proof that such information are consistent with the actual content of the database. We show that such a primitive can be securely implemented in a distributed fashion. Furthermore, we describe the design principles for a distributed architecture that would allow the use of this primitive on mobile devices.

Lecture Notes in Computer Science, 2005
The Domain Name System (DNS) is an essential component of the critical infrastructure of the Inte... more The Domain Name System (DNS) is an essential component of the critical infrastructure of the Internet. The role of DNS is vital, as it is involved in virtually every Internet transaction. It is sometimes remarked that DNS works well as it is now and any changes to it may disrupt its functionality and add complexity. However, due to its importance, an insecure DNS is unacceptable for current and future networks. The astonishing simplicity of mounting an attack against the DNS and the damaging potential of such an attack should convince practitioners and system administrators to employ a secure version of DNS. However, security comes with a cost. In this paper, we examine the performance of two proposals for secure DNS and we discuss the advantages and disadvantages of both. In particular, we analyze the impact that security measures have on the performance of DNS. While it is clear that adding security will lower DNS performance, our results show that the impact of security can be mitigated by deploying different security extensions at different levels in the DNS tree.

A secure file sharing service for distributed computing environments
The Journal of Supercomputing, 2014
ABSTRACT Distributed cryptographic file systems enable file sharing among their users and need th... more ABSTRACT Distributed cryptographic file systems enable file sharing among their users and need the adoption of a key management scheme for the distribution of the cryptographic keys to authorized users according to their specific degree of trust. In this paper we describe the architecture of a basic secure file sharing facility relying on a multi-party threshold-based key-sharing scheme that can be overlaid on top of the existing stackable networked file systems, and discuss its application to the implementation of distributed cryptographic file systems. It provides flexible access control policies supporting multiple combination of roles and trust profiles. A proof of concept prototype implementation within the Linux operating system framework demonstrated its effectiveness in terms of performance and security robustness.
Proceedings of the …, 2001
Recent advances in hardware and communication technologies have made possible and cost e ective t... more Recent advances in hardware and communication technologies have made possible and cost e ective to share a le system among several machines over a local (but possibly also a wide) area network. One of the most successful and widely used such applications is Sun's ...
In this paper we consider the problem of securely outsourcing computation on private data. We pre... more In this paper we consider the problem of securely outsourcing computation on private data. We present a protocol for securely distributing the computation of the data structures used by current implementations of the Certified Information Access primitive. To this aim, we introduce the concept of a Verifiable Deterministic Envelope that may be of independent interest and of which we provide
Uploads
Papers by Aniello Del Sorbo