A Security Protocol for Self-Organizing Data Storage

نویسندگان

  • Nouha Oualha
  • Melek Önen
  • Yves Roudier
چکیده

This paper describes a cryptographic protocol for securing self-organized data storage through periodic verifications. Such verifications are beyond simple integrity checks since peers generate a proof that they still conserve the data they are supposed to be storing. The proposed verification protocol is efficient, deterministic, and scalable and successfully prevents most of the security threats to self-organizing storage verification. In particular, a data owner can prevent data destruction at a specific holder by storing personalized replicas crafted thanks to the use of elliptic curve cryptography. The security of this scheme relies both on the ECDLP intractability assumption and on the difficulty of finding the order of some specific elliptic curve over Zn. Furthermore, the protocol also makes it possible for the data owner to delegate the verification operation to other nodes without revealing any secret information.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure P2P Data Storage and Maintenance

P2P data storage requires strong reliability and security assurances. Existing data storage solutions have been designed for centralized as well as distributed settings, yet they do not address the security and cooperation issues raised by self-organization. P2P systems also introduce new needs regarding data availability due to the dynamicity of the infrastructure, and which are unaddressed so...

متن کامل

MAZE Security Protocol for Self Securing S4 Storage Server

Storage area network (SAN) is an emerging technology in the industry with the capability to handle ever growing requirement for data storage in any enterprise. The flexibility provided by storage area network also opens up major security concerns. The security protocols designed for self securing S4 storage server have focused on recovery from intruder attacks and corruption of data by extensiv...

متن کامل

A Self-Organizing Storage Cluster for Decentralized and Reliable File Storage*

This paper describes the design and implementation of a decentralized storage cluster for file storage so as to provide self-organizing, available, scalable, and consistent data management capability for cluster platform. The self-organizing capability of CHT grants our storage cluster the potential to handle both failure and online provisioning gracefully. We use soft-state to manage membershi...

متن کامل

Landforms identification using neural network-self organizing map and SRTM data

During an 11 days mission in February 2000 the Shuttle Radar Topography Mission (SRTM) collected data over 80% of the Earth's land surface, for all areas between 60 degrees N and 56 degrees S latitude. Since SRTM data became available, many studies utilized them for application in topography and morphometric landscape analysis. Exploiting SRTM data for recognition and extraction of topographic ...

متن کامل

Classification of Streaming Fuzzy DEA Using Self-Organizing Map

The classification of fuzzy data is considered as the most challenging areas of data analysis and the complexity of the procedures has been obstacle to the development of new methods for fuzzy data analysis. However, there are significant advances in modeling systems in which fuzzy data are available in the field of mathematical programming. In order to exploit the results of the researches on ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008