Hiding Malware On Distributed Storage

被引:0
|
作者
Moubarak, Joanna [1 ]
Chamoun, Maroun [1 ]
Filiol, Eric [2 ]
机构
[1] USJ, Fac Engn, Beirut, Lebanon
[2] ESIEA, C V Lab, Laval, France
来源
2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT) | 2019年
关键词
Malware; Blockchain; Distributed storage; Swarm; IPFS; Ethereum;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Blockchain technology has been one of the major innovations in recent years. Crypto-currencies and decentralized applications are increasingly adopted. Their principles led the foundation for new ideas underlying others distributed ledger technologies (DLTs). In particular, decentralized storage employs non-recursive functions and similar algorithms compared to the Blockchain technology. Furthermore, digital signatures procedures have been used for storage validation. This paper summarizes IPFS and Swarm technologies and exposes how we managed to hide our malware on distributed storage. Our demonstration's results illustrate the possibility to hide malicious content by segregating it and reveal that decentralized storages have many concerns and lack security verification procedures.
引用
收藏
页码:720 / 725
页数:6
相关论文
共 50 条
  • [41] A Survey on Network Codes for Distributed Storage
    Dimakis, Alexandros G.
    Ramchandran, Kannan
    Wu, Yunnan
    Suh, Changho
    PROCEEDINGS OF THE IEEE, 2011, 99 (03) : 476 - 489
  • [42] Grid based pervasive distributed storage
    Arias, Diego
    Sanabria, John
    Rivera, Wilson
    2007 2ND INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING, VOLS 1 AND 2, 2007, : 316 - +
  • [43] Secure Distributed Storage for Bulk Data
    Minowa, Tadashi
    Takahashi, Takeshi
    NEURAL INFORMATION PROCESSING, ICONIP 2012, PT V, 2012, 7667 : 566 - 575
  • [44] Research on distributed data storage model
    Wei, QS
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2765 - 2769
  • [45] Efficient allocation and composition of distributed storage
    Jimmy Secretan
    Malachi Lawson
    Ladislau Bölöni
    The Journal of Supercomputing, 2009, 47 : 286 - 310
  • [46] Efficient allocation and composition of distributed storage
    Secretan, Jimmy
    Lawson, Malachi
    Boeloeni, Ladislau
    JOURNAL OF SUPERCOMPUTING, 2009, 47 (03) : 286 - 310
  • [47] Erasure coding for distributed storage: an overview
    S.B.BALAJI
    M.Nikhil KRISHNAN
    Myna VAJHA
    Vinayak RAMKUMAR
    Birenjith SASIDHARAN
    P.Vijay KUMAR
    ScienceChina(InformationSciences), 2018, 61 (10) : 7 - 51
  • [48] Synchronizing Edits in Distributed Storage Networks
    El Rouayheb, Salim
    Goparaju, Sreechakra
    Kiah, Han Mao
    Milenkovic, Olgica
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1472 - 1476
  • [49] The performative design of distributed storage agents
    Yong, Z
    Zhang, JL
    DCABES 2004, PROCEEDINGS, VOLS, 1 AND 2, 2004, : 251 - 254
  • [50] Network Coding for Distributed Storage Systems
    Dimakis, Alexandros G.
    Godfrey, P. Brighten
    Wu, Yunnan
    Wainwright, Martin J.
    Ramchandran, Kannan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (09) : 4539 - 4551