Increasing DHT data security by scattering data

Bryan Mills, Taieb Znati

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

This paper describes methods for increasing the security of data being stored in a distributed hash table (DHT) which leverages the inherent properties of the DHT to provide a secure storage substrate. The methods presented are based upon a framework referred to as "Scatter, Conceal, and Recover" (SCAR). The standard method of securing data in a DHT is to encrypt the data using symmetrical encryption before storing it in the network. SCAR provides this level of security, but also prevents any known cryptoanalisys from being performed. It does this by dividing data into multiple blocks and scattering these blocks within the DHT. The security of SCAR is provided by the property that an attacker is unable to obtain and reassemble the data blocks correctly. However, if the attacker has access to the network communication, the likelihood of a successful attack is significantly increased. This paper defines how such attacks can be executed and provides methods for ensuring data security in spite of such attacks.

Original languageEnglish
Title of host publication2008 Proceedings of 17th International Conference on Computer Communications and Networks, ICCCN 2008
Pages430-434
Number of pages5
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event17th International Conference on Computer Communications and Networks, ICCCN 2008 - St. Thomas, Virgin Islands, U.S.
Duration: Aug 3 2008Aug 7 2008

Publication series

NameProceedings - International Conference on Computer Communications and Networks, ICCCN
ISSN (Print)1095-2055

Conference

Conference17th International Conference on Computer Communications and Networks, ICCCN 2008
Country/TerritoryVirgin Islands, U.S.
CitySt. Thomas
Period8/3/088/7/08

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'Increasing DHT data security by scattering data'. Together they form a unique fingerprint.

Cite this