Trusted Bridge

نویسندگان

  • Hao Zhuang
  • Erh-Li Shen
  • Jin Wang
چکیده

Nowadays, there are many online file storage services providing convienent, accessible and giant clouds for people’s daily usage. However, the convenience always comes with trust issues. There are many hackers around the world, sometimes your precious even private information is under peeking. This kind of hackers can also be extended to business services, e.g. data mining, machine learning, analysis for advertisment, or internal company employees misconducts. In this paper, we propose a trusted interface, so-called Trusted Bridge, which is built between user and different clouds (backend storage servers, Dropbox). This middle firmware creates a safe interface for storing and retrieving files. As a bridge, it does not store file directly, but guides the files with versatile encrypt methods to commute different clouds (or user’s different accounts in the same cloud) automatically. More than a bridge, it is trustable because during this operations, the bridge partitions file and use hash function to determine the destination and replication strategy. The destinations are user’s existed account within different cloud storage servers. When users want to fetch their files, the bridge know how to provide the tunnel with the key assigned. Because this procedures, those untrusted third-party storage systems only have (parts of) pieces of certain unordered files. So people can use the such untrusted services without worrying their privacy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Methodology to Bridge Different Domains of Trust in Mobile Communications

Trust is playing an important role in communications and transactions. Based on different reasons of trust, different trusted domains, possibly disjoint, are formed in mobile communications, preventing complete systems from working properly. What is lacked therein is a bridge that can link domains, across trust gaps to establish a complete trusted mobile communication system. In this paper, the...

متن کامل

How Can Quasi-trusted Nodes Help to Securely Relay QKD Keys?

We propose a new definition for quasi-trusted relays. Our quasi-trusted relays are defined as follows: (1) being honest enough to correctly follow a given multi-party finitetime communication protocol; (2) however, being under the monitoring of eavesdroppers. From the new definition, we first develop a simple 3-party quasi-trusted model called Quantum Quasi-Trusted Bridge (QQTB) model. In this ...

متن کامل

A Trusted Mobile Payment Scheme Based on Body Area Networks

With the development of intelligent mobile phones and the improvement of wireless communication infrastructure, mobile payment is gradually accepted by the public. However, since intelligent mobile phones are not trusted devices, mobile payment faces serious security problems. To address the problems, this paper designs a trusted mobile payment scheme based on body area networks. The scheme bui...

متن کامل

On the Applicability of Trusted Computing in Distributed Authorization Using Web Services

Distributed authorization provides the ability to control access to resources spread over the Internet. Typical authorization systems consider a range of security information like user identities, role identities or even temporal, spatial and contextual information associated with the access requestor. However, the ability to include computing platform related information has been quite limited...

متن کامل

Design and Construction of a Reinforcement Free Concrete Bridge Deck on Precast Bulb Tee Girders

This presentation describes the concepts involved in design and construction of a reinforcement-free bridge deck intended to provide cost effective, durable and more rapid construction for highway bridges. The new wide flanged or bulb tee precast prestressed concrete girder sections currently used in bridges allow for a shorter effective span for the bridge deck because of the wide girder flang...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015