Title :
Increasing DHT Data Security by Scattering Data (Invited Paper)
Author :
Mills, Bryan ; Znati, Taieb
Author_Institution :
Dept. of Comput. Sci., Univ. of Pittsburgh, Pittsburgh, PA
Abstract :
This paper describes methods for increasing the security of data being stored in a distributed hash table (DHT) which leverages the inherent properties of the DHT to provide a secure storage substrate. The methods presented are based upon a framework referred to as "scatter, conceal, and recover" (SCAR). The standard method of securing data in a DHT is to encrypt the data using symmetrical encryption before storing it in the network. SCAR provides this level of security, but also prevents any known cryptoanalisys from being performed. It does this by dividing data into multiple blocks and scattering these blocks within the DHT. The security of SCAR is provided by the property that an attacker is unable to obtain and reassemble the data blocks correctly. However, if the attacker has access to the network communication, the likelihood of a successful attack is significantly increased. This paper defines how such attacks can be executed and provides methods for ensuring data security in spite of such attacks.
Keywords :
cryptography; table lookup; data security; distributed hash table; scatter-conceal-and-recover framework; secure storage substrate; symmetrical encryption; Computer science; Cryptography; Data security; Fires; Memory; Milling machines; Peer to peer computing; Scattering; Secure storage; Telecommunication traffic;
Conference_Titel :
Computer Communications and Networks, 2008. ICCCN '08. Proceedings of 17th International Conference on
Conference_Location :
St. Thomas, US Virgin Islands
Print_ISBN :
978-1-4244-2389-7
Electronic_ISBN :
1095-2055
DOI :
10.1109/ICCCN.2008.ECP.90