Secure remote storage through authenticated encryption

被引:12
|
作者
Hou, Fangyong [1 ]
Gu, Dawu [2 ]
Xiao, Nong [1 ]
Tang, Yuhua [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
来源
PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE | 2008年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/NAS.2008.48
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Storage systems are more distributed and more subject to attacks. Cryptographic file system gives a promising way to mitigate the danger of exposing data by using encryption and integrity protection methods and guarantee end-to-end security to clients. This paper describes SRSAE, a generic approach to cryptographic file system, as well as its realization in a distributed data storage environment. SRSAE applies authenticated encryption to each data block transferred between clients and the remote block devices. It provides strong data confidentiality and integrity protections through trusted IV (Initialization Vector) and MAC (Message Authentication Code) comparison. Performance is optimized by buffering IV and MAC locally. Integration into original file system is presented with specific implementation. Related model, approach and system realization are elaborated as well as testing results. Theoretical analysis and experimental simulations show that it is a practical and available way to build secure network storage system.
引用
收藏
页码:3 / +
页数:2
相关论文
共 50 条
  • [1] Predicate Encryption for Secure Remote Storage
    Persiano, Giuseppe
    TRUSTWORTHY GLOBAL COMPUTING, 2010, 6084 : 87 - 87
  • [2] Unconditionally secure authenticated encryption
    Shikata, J
    Hanaoka, G
    Zheng, YL
    Matsumoto, T
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (05): : 1119 - 1131
  • [3] Secure Fully Homomorphic Authenticated Encryption
    Kim, Jeongsu
    Yun, Aaram
    IEEE ACCESS, 2021, 9 : 107279 - 107297
  • [4] A secure authenticated encryption scheme and its extension
    Zhang, Jianhong
    Cheng, Ji
    PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 74 - 78
  • [5] Unconditionally Secure Authenticated Encryption with Shorter Keys
    Alomair, Basel
    Poovendran, Radha
    SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 3 - 15
  • [6] TriviA: A Fast and Secure Authenticated Encryption Scheme
    Chakraborti, Avik
    Chattopadhyay, Anupam
    Hassan, Muhammad
    Nandi, Mridul
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 330 - 353
  • [7] Secure Disk with Authenticated Encryption and IV Verification
    Hou, Fangyong
    Xiao, Nong
    Liu, Fang
    He, Hongjun
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 41 - 44
  • [8] QCB: Efficient Quantum-Secure Authenticated Encryption
    Bhaumik, Ritam
    Bonnetain, Xavier
    Chailloux, Andre
    Leurent, Gaetan
    Naya-Plasencia, Maria
    Schrottenloher, Andre
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 668 - 698
  • [9] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [10] Adaptively secure broadcast encryption with authenticated content distributors
    Guo, Dianli
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) : 7889 - 7910