TY - GEN
T1 - Increasing DHT data security by scattering data
AU - Mills, Bryan
AU - Znati, Taieb
PY - 2008
Y1 - 2008
N2 - This paper describes methods for increasing the security of data being stored in a distributed hash table (DHT) which leverages the inherent properties of the DHT to provide a secure storage substrate. The methods presented are based upon a framework referred to as "Scatter, Conceal, and Recover" (SCAR). The standard method of securing data in a DHT is to encrypt the data using symmetrical encryption before storing it in the network. SCAR provides this level of security, but also prevents any known cryptoanalisys from being performed. It does this by dividing data into multiple blocks and scattering these blocks within the DHT. The security of SCAR is provided by the property that an attacker is unable to obtain and reassemble the data blocks correctly. However, if the attacker has access to the network communication, the likelihood of a successful attack is significantly increased. This paper defines how such attacks can be executed and provides methods for ensuring data security in spite of such attacks.
AB - This paper describes methods for increasing the security of data being stored in a distributed hash table (DHT) which leverages the inherent properties of the DHT to provide a secure storage substrate. The methods presented are based upon a framework referred to as "Scatter, Conceal, and Recover" (SCAR). The standard method of securing data in a DHT is to encrypt the data using symmetrical encryption before storing it in the network. SCAR provides this level of security, but also prevents any known cryptoanalisys from being performed. It does this by dividing data into multiple blocks and scattering these blocks within the DHT. The security of SCAR is provided by the property that an attacker is unable to obtain and reassemble the data blocks correctly. However, if the attacker has access to the network communication, the likelihood of a successful attack is significantly increased. This paper defines how such attacks can be executed and provides methods for ensuring data security in spite of such attacks.
UR - http://www.scopus.com/inward/record.url?scp=57849148576&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=57849148576&partnerID=8YFLogxK
U2 - 10.1109/ICCCN.2008.ECP.90
DO - 10.1109/ICCCN.2008.ECP.90
M3 - Conference contribution
AN - SCOPUS:57849148576
SN - 9781424423903
T3 - Proceedings - International Conference on Computer Communications and Networks, ICCCN
SP - 430
EP - 434
BT - 2008 Proceedings of 17th International Conference on Computer Communications and Networks, ICCCN 2008
T2 - 17th International Conference on Computer Communications and Networks, ICCCN 2008
Y2 - 3 August 2008 through 7 August 2008
ER -