• DocumentCode
    3390765
  • Title

    JigDFS: A secure distributed file system

  • Author

    Bian, Jiang ; Seker, Remzi

  • Author_Institution
    Univ. of Arkansas at Little Rock, Little Rock, AR
  • fYear
    2009
  • fDate
    March 30 2009-April 2 2009
  • Firstpage
    76
  • Lastpage
    82
  • Abstract
    Ubiquitous connectivity and availability of P2P resources creates opportunities for building new services. This paper describes Jigsaw Distributed File System (JigDFS) which can be used to securely store and retrieve files on a P2P network anonymously. JigDFS is designed to provide strong encryption and a certain level of plausible deniability. Files in JigDFS are sliced into small segments using an information dispersal algorithm (IDA) and distributed onto different nodes recursively to increase fault tolerance against node failures. Moreover, layered encryption is applied to each file with keys produced by a hashed-key chain algorithm, so that data (file segments) and keys reside on different hosts. In such a scheme, if an attacker compromises a host and retrieves the data, the attacker will still need the correct key to decipher the data. Furthermore, recursive IDA and layered encryption ensure users´ anonymity. It is difficult for an adversary to identify who owns a file, even who has retrieved a file in JigDFS. Often, a strong adversary may have the power to monitor the network or even force a user to give up the password. Design of JigDFS provides users with plausible deniability which enhances privacy. When being questioned, a JigDFS user can simply argue that he/she is merely a relaying node, rather than the file owner. Moreover, a user, when forced, can give up a valid, however, incorrect encryption key. There is no way for an adversary to verify either correctness of a key or the identity of file owner. JigDFS is developed using platform independent Java technologies and is envisioned to utilize mobile computing elements such as PDAs and smart phones.
  • Keywords
    Java; cryptography; data privacy; information retrieval; mobile computing; peer-to-peer computing; software fault tolerance; ubiquitous computing; P2P network; fault tolerance; files retrieval; hashed-key chain algorithm; independent Java technologies platfrom; information dispersal algorithm; jigsaw distributed file system; layered encryption; mobile computing elements; node failures; secure distributed file system; ubiquitous connectivity; Availability; Buildings; Cryptography; Fault tolerance; File systems; Information retrieval; Monitoring; Personal digital assistants; Privacy; Relays;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence in Cyber Security, 2009. CICS '09. IEEE Symposium on
  • Conference_Location
    Nashville, TN
  • Print_ISBN
    978-1-4244-2769-7
  • Type

    conf

  • DOI
    10.1109/CICYBS.2009.4925093
  • Filename
    4925093