Towards a DHT Networks and Safe File Sharing Scheme in Cloud Storage Service

@inproceedings{Lu2015TowardsAD,
  title={Towards a DHT Networks and Safe File Sharing Scheme in Cloud Storage Service},
  author={Zhongning Lu and Gaofeng Shen},
  year={2015}
}
Safe file sharing mechanism in cloud storage is one of the most significant elements that affects the development of security technology. With application of homomorphic key agreement mechanism, Shamir secret sharing algorithm, Bloom Filter and B-tree search algorithm and Rsync data updating algorithm, a safe file sharing scheme in cloud storage is established based on cloud storage infrastructure of DHT networks. Under the circumstance of cloud storage, the scheme can make full use of the… 
2 Citations

Figures from this paper

File retrieval and storage in the open source cloud tool using digital bipartite and digit compact prefix indexing method

A new method called digital bipartite and digit compact prefix with hashing technique is used to store and retrieve data in the cloud to create a volume of storage for a user within the data center to store their files.

References

SHOWING 1-10 OF 25 REFERENCES

Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage

This paper proposes a mechanism that combines data deduplication with dynamic data operations in the privacy preserving public auditing for secure cloud storage and shows that the proposed mechanism is highly efficient and provably secure.

FADE: Secure Overlay Cloud Storage with File Assured Deletion

FADE, a practical, implementable, and readily deployable cloud storage system that focuses on protecting deleted data with policy-based file assured deletion, is designed and implemented, and insights are provided of how to incorporate value-added security features into current data outsourcing applications.

Homomorphic Encryption Applied to the Cloud Computing Security

This paper is proposing an application of a method to execute operations on encrypted data without decrypting them which will provide the same results after calculations as if the authors have worked directly on the raw data.

Privacy-Preserving Public Auditing For Secure Cloud Storage

The proposed system is capable of supporting public auditability, data dynamics and Multiple TPA are used for the auditing process and extends the concept to ring signatures in which HARS scheme is used.

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

The public key based homomorphic authenticator is utilized and uniquely integrate it with random mask technique to achieve a privacy-preserving public auditing system for cloud data storage security while keeping all above requirements in mind.

SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy

This paper proposes a new scheme to prevent hopping attacks by way of extending the length range of the key shares to increase the attack cost substantially, and does some improvement on the Shamir Secret Sharing algorithm implemented in the Original Vanish system.

Privacy Preserving Keyword Searches on Remote Encrypted Data

This paper offers solutions for the problem of efficiently retrieving some of the encrypted files containing (or indexed by) specific keywords, keeping the keywords themselves secret and not jeopardizing the security of the remotely stored files.

Practical techniques for searches on encrypted data

  • D. SongD. WagnerA. Perrig
  • Computer Science, Mathematics
    Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000
  • 2000
This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.

ON DATA BANKS AND PRIVACY HOMOMORPHISMS

It appears likely that there exist encryption functions which permit encrypted data to be operated on without preliminary decryption of the operands, for many sets of interesting operations.

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs

This paper defeats the deployed Vanish implementation, explains how the original paper’s security analysis is flawed, and draws lessons for future system designs, concluding that public DHTs like Vuze probably cannot provide strong security for Vanish.