TY - GEN
T1 - SCAR - Scattering, concealing and recovering data within a DHT
AU - Mills, Bryan N.
AU - Znati, Taieb F.
PY - 2008
Y1 - 2008
N2 - This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage substrate. The framework presented is referred to as "Scatter, Conceal, and Recover" (SCAR). The standard method of securing data in a DHT is to encrypt the data using symmetrical encryption before storing it in the network. SCAR provides this level of security, but also prevents any known cryptoanalysis from being performed. It does this by breaking the data into smaller blocks and scattering these blocks throughout the DHT. Hence, SCAR prevents any unauthorized user from obtaining the entire encrypted data block. SCAR uses hash chains to determine the storage locations for these blocks within the DHT. To ensure storage availability, SCAR uses an erasure coding scheme to provide full data recovery given only partial block recovery. This paper first presents the SCAR framework and its associated protocols and mechanisms. The paper then discusses a prototype implementation of SCAR, and presents a simulation-based experimental study. The results show that in order for the erasure coding techniques used by SCAR to be effective, P2P nodes must sufficiently available.
AB - This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage substrate. The framework presented is referred to as "Scatter, Conceal, and Recover" (SCAR). The standard method of securing data in a DHT is to encrypt the data using symmetrical encryption before storing it in the network. SCAR provides this level of security, but also prevents any known cryptoanalysis from being performed. It does this by breaking the data into smaller blocks and scattering these blocks throughout the DHT. Hence, SCAR prevents any unauthorized user from obtaining the entire encrypted data block. SCAR uses hash chains to determine the storage locations for these blocks within the DHT. To ensure storage availability, SCAR uses an erasure coding scheme to provide full data recovery given only partial block recovery. This paper first presents the SCAR framework and its associated protocols and mechanisms. The paper then discusses a prototype implementation of SCAR, and presents a simulation-based experimental study. The results show that in order for the erasure coding techniques used by SCAR to be effective, P2P nodes must sufficiently available.
UR - http://www.scopus.com/inward/record.url?scp=50149117080&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=50149117080&partnerID=8YFLogxK
U2 - 10.1109/ANSS-41.2008.38
DO - 10.1109/ANSS-41.2008.38
M3 - Conference contribution
AN - SCOPUS:50149117080
SN - 0769531431
SN - 9780769531434
T3 - Proceedings - Simulation Symposium
SP - 35
EP - 42
BT - Proceedings - 41st Annual Simulation Symposuim, ANSS 2008
T2 - 41st Annual Simulation Symposuim, ANSS 2008
Y2 - 13 April 2008 through 16 April 2008
ER -