321,982 research outputs found
Distributed Storage for Data Security
We study the secrecy of a distributed storage system for passwords. The
encoder, Alice, observes a length-n password and describes it using two hints,
which she then stores in different locations. The legitimate receiver, Bob,
observes both hints. The eavesdropper, Eve, sees only one of the hints; Alice
cannot control which. We characterize the largest normalized (by n) exponent
that we can guarantee for the number of guesses it takes Eve to guess the
password subject to the constraint that either the number of guesses it takes
Bob to guess the password or the size of the list that Bob must form to
guarantee that it contain the password approach 1 as n tends to infinity.Comment: 5 pages, submitted to ITW 201
HVSTO: Efficient Privacy Preserving Hybrid Storage in Cloud Data Center
In cloud data center, shared storage with good management is a main structure
used for the storage of virtual machines (VM). In this paper, we proposed
Hybrid VM storage (HVSTO), a privacy preserving shared storage system designed
for the virtual machine storage in large-scale cloud data center. Unlike
traditional shared storage, HVSTO adopts a distributed structure to preserve
privacy of virtual machines, which are a threat in traditional centralized
structure. To improve the performance of I/O latency in this distributed
structure, we use a hybrid system to combine solid state disk and distributed
storage. From the evaluation of our demonstration system, HVSTO provides a
scalable and sufficient throughput for the platform as a service
infrastructure.Comment: 7 pages, 8 figures, in proceeding of The Second International
Workshop on Security and Privacy in Big Data (BigSecurity 2014
Improving the Secrecy of Distributed Storage Systems using Interference Alignment
Regenerating codes based on the approach of interference alignment for
wireless interference channel achieve the cut-set bound for distributed storage
systems. These codes provide data reliability, and perform efficient exact node
repair when some node fails. Interference alignment as a concept is especially
important to improve the repair efficiency of a failed node in a minimum
storage regenerating (MSR) code. In addition it can improve the stored data
security in presence of passive intruders. In this paper we construct a new
code resilient against a threat model where a passive eavesdropper can access
the data stored on a subset of nodes and the downloaded data during the repair
process of a subset of failed nodes. We achieve an optimal secrecy capacity for
the new explicit construction of MSR interference alignment code. Hence, we
show that the eavesdropper obtains zero information from the original message
stored across the distributed storage, and that we achieve a perfect secrecy.Comment: 20 pages, 3 figure
Secure Repairable Fountain Codes
In this letter, we provide the construction of repairable fountain codes
(RFCs) for distributed storage systems that are information-theoretically
secure against an eavesdropper that has access to the data stored in a subset
of the storage nodes and the data downloaded to repair an additional subset of
storage nodes. The security is achieved by adding random symbols to the
message, which is then encoded by the concatenation of a Gabidulin code and an
RFC. We compare the achievable code rates of the proposed codes with those of
secure minimum storage regenerating codes and secure locally repairable codes.Comment: To appear in IEEE Communications Letter
Computing on Masked Data to improve the Security of Big Data
Organizations that make use of large quantities of information require the
ability to store and process data from central locations so that the product
can be shared or distributed across a heterogeneous group of users. However,
recent events underscore the need for improving the security of data stored in
such untrusted servers or databases. Advances in cryptographic techniques and
database technologies provide the necessary security functionality but rely on
a computational model in which the cloud is used solely for storage and
retrieval. Much of big data computation and analytics make use of signal
processing fundamentals for computation. As the trend of moving data storage
and computation to the cloud increases, homeland security missions should
understand the impact of security on key signal processing kernels such as
correlation or thresholding. In this article, we propose a tool called
Computing on Masked Data (CMD), which combines advances in database
technologies and cryptographic tools to provide a low overhead mechanism to
offload certain mathematical operations securely to the cloud. This article
describes the design and development of the CMD tool.Comment: 6 pages, Accepted to IEEE HST Conferenc
A Survey on Secure Storage Services in Cloud Computing
Cloud computing is an emerging technology and it is purely based on internet and its environment It provides different services to users such as Software-as-a-Service SaaS PaaS IaaS Storage-as-a-service SaaS Using Storage-as-a-Service users and organizations can store their data remotely which poses new security risks towards the correctness of data in cloud In order to achieve secure cloud storage there exists different techniques such as flexible distributed storage integrity auditing mechanism distributed erasure-coded data Merkle Hash Tree MHT construction etc These techniques support secure and efficient dynamic data storage in the cloud This paper also deals with architectures for security and privacy management in the cloud storage environmen
- …