Scar - Scatter, Conceal and Recover

نویسنده

  • Bryan Mills
چکیده

SCAR SCATTER, CONCEAL AND RECOVER Bryan Mills, M.S. University of Pittsburgh, 2007 This thesis describes a secure and reliable method for storing data in a distributed hash table (DHT) that leverages the inherent properties of the DHT to provide a secure storage substrate. The framework presented is referred to as “Scatter, Conceal, and Recover” (SCAR). The standard method of securing data in a DHT is to encrypt the data using symmetrical encryption before storing it in the network. SCAR provides this level of security, but also prevents any known cryptoanalysis from being performed. It does this by breaking the data into smaller blocks and scattering these blocks throughout the DHT. Hence, SCAR prevents any unauthorized user from obtaining the entire encrypted data block. SCAR uses hash chains to determine the storage locations for the data blocks within the DHT. To ensure storage availability, SCAR uses an erasure coding scheme to provide full data recovery given only partial block recovery. This thesis presents the details of SCAR. First, the framework, related protocols, and mechanisms are described. Second, a prototype implementation is presented showing the feasibility of SCAR. Third, analytical models are discussed that characterize SCAR’s behavior, the models are then validated using experimental results. Lastly, the models are analyzed to further understand the tradeoff between data security and data availability. The exploration of this tradeoff leads to the conclusion that SCAR can effectively balance this tradeoff when the nodes of the network are “sufficiently” available.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hypertrophic Scars and KeloidsFA Review of Their Pathophysiology, Risk Factors, and Therapeutic Management

Hypertrophic scars and keloids are a problem that mainly dermatologists and plastic surgeons encounter. Especially in the head and neck region, these lesions are conspicuous and not easy for patients to conceal. Patients typically present with cosmetic concerns, although hypertrophic scars and keloids can also cause pruritus, pain, or pressure. This article reviews various treatment modalities ...

متن کامل

Distal biceps rupture: the coil sign.

Delayed repair of the distal biceps brachii tendon can lead to the formation of scar tissue and coiling of the tendon. Dissection of the scar tissue and unraveling of the tendon may allow for anatomic repair to the radial tuberosity. A 50-year-old man had a distal biceps brachii tendon tear with an intact lacertus fibrosis. Surgery was performed 22 days after injury. On inspection, the distal b...

متن کامل

Mailet: Instant Social Networking under Censorship

Social media websites are blocked in many regimes where Internet censorship is applied. In this paper, we introduce Mailet, an unobservable transport proxy which enables the users to access social websites by email applications. Without assuming the Mailet servers are trustworthy, Mailet can support the services requiring privileges without having the complete credential. Particularly, the cred...

متن کامل

Data Recovery from Windows CE Based Handheld Devices

Data hiding creates serious problems for digital forensic practitioners attempting to recover evidence. It is possible to conceal large amounts of sensitive data in handheld devices in a manner that prevents their recovery using standard forensic tools. This paper describes a technique for recovering data stored in the slack memory of Windows CE based devices. A case study involving data hiding...

متن کامل

Independent Subspace Analysis Using Three Scatter Matrices

Abstract: In independent subspace analysis (ISA) one assumes that the components of the observed random vector are linear combinations of the components of a latent random vector with independent subvectors. The problem is then to find an estimate of a transformation matrix to recover the independent subvectors. Regular independent component analysis (ICA) is a special case. In this paper we sh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007