Академический Документы
Профессиональный Документы
Культура Документы
7/14/2019 5
Department of Computer Engg., SITS Narhe
Sr Author Paper name Year Advantage Limitation
N
o
1 J. K. Resch AONT-RS: 2011 Describe a new dispersal An adversary which
and J. S. Plank Blending Security scheme, called AONT-RS, knows
and Performance in which blends an the encryption key can
Dispersed Storage All-Or-Nothing Transform decrypt data stored on
Systems, with Reed-Solomon coding single
to achieve high security with servers.
low computational and
storage
costs.
2 M. Dürmuth Deniable encryption 2011 Give the first public key Do not consider the
and D. M. with encryption scheme that efficiency
Freeman negligible detection satisfies the definition of
probability: An sender-deniability with a
interactive single encryption algorithm
construction, and negligible probability of
detection
Sr Author paper Year Advantage Limitation
no
3. Z. Wu, M. SPANStore: Cost- 2013 Present SPANStore, a key-value store To tolerate failures,
Butkiewicz, D. effective Geo- that exports a unified view of storage SPANStore
Perkins, E. replicated Storage services in geographically distributed provisions more data
Katz-Bassett, Spanning data centers centers to serve as
and H. V. Multiple Cloud replicas.This results
Madhyastha Services in higher cost
4. A. Bessani, M. DepSky: 2011 Presents the design and evaluation of Cost roughly double
Correia, B. Dependable and DEPSKY, a storage service that of using a single
Quaresma, F. Secure Storage in improves the availability and confi- cloud for a practical
André, and P. a Cloud-ofclouds dentiality provided by commercial scenario.
Sousa storage cloud services.
5. C. Basescu, C. Robust 2011 Provide a robust, asynchronous, and Practical KVSs may
Cachin, I. Eyal, Data Sharing with space-efficient emulation of a only provide
R. Haas, and M. Key-value Stores register over a set of KVSs eventual consistency
Vukolic
To ensure data confidentiality against an adversary
which knows the encryption key and has access to a
large fraction of the cipher-text blocks.
7/14/2019 8
Department of Computer Engg., SITS Narhe
To improve security, performance, and
confidentiality of data.
7/14/2019 9
Department of Computer Engg., SITS Narhe
Department of Computer Engg.,
SITS Narhe 7/14/2019 11
Department of Computer Engg.,
SITS Narhe 7/14/2019 12
Department of Computer Engg., SITS Narhe 7/14/2019 13
7/14/2019 14
Department of Computer Engg., SITS Narhe
Department of Computer Engg., SITS Narhe 7/14/2019 15
7/14/2019 16
Department of Computer Engg., SITS Narhe
H/W System Configuration:-
7/14/2019 18
Department of Computer Engg., SITS Narhe
Decryption
Compute y′ = y ・ A−1
Decrypt y′ using K.
◦ Where matrix A is invertible and A = A−1
◦ A is a square matrix such that:
◦ (i) all diagonal elements are set to 0, and
◦ (ii) the remaining off-diagonal elements are set to
1
7/14/2019 19
Department of Computer Engg., SITS Narhe
7/14/2019 20
Department of Computer Engg., SITS Narhe
7/14/2019 21
Department of Computer Engg., SITS Narhe
Existing System Proposed System
AON encryption schemes require a Bastion first encrypts the data with
pre-processing round of block one round of block cipher
cipher encryption. encryption.
7/14/2019 22
Department of Computer Engg., SITS Narhe
We introduced a security mechanism that
ensures data confidentiality against the attacker
which has the access to encryption key.
Bastion, ensures the confidentiality of encrypted
data even when the adversary has access to one
or more cipher blocks.
Bastion is most useful when cipher-text is stored
in Multi-cloud storage environment.
Bastion is considered to improves (by more than
50%) the performance of existing architectures
which offer comparable security under key
exposure
7/14/2019 23
Department of Computer Engg., SITS Narhe
7/14/2019 24
Department of Computer Engg., SITS Narhe
A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa, “DepSky: Dependable and
Secure Storage in a Cloud-ofclouds,” in Sixth Conference on Computer Systems
(EuroSys), 2011, pp. 31–46.
C. Basescu, C. Cachin, I. Eyal, R. Haas, and M. Vukolic, “Robust Data Sharing with
Key-value Stores,” in ACM SIGACT- SIGOPS Symposium on Principles of Distributed
Computing (PODC), 2011, pp. 221–222.
J. K. Resch and J. S. Plank, “AONT-RS: Blending Security and Performance in
Dispersed Storage Systems,” in USENIX Conference on File and Storage echnologies
(FAST), 2011, pp. 191–202.
R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky, “Deniable Encryption,” in
Proceedings of CRYPTO, 1997.
Z. Wu, M. Butkiewicz, D. Perkins, E. Katz-Bassett, and H. V. Madhyastha, “SPANStore:
Cost-effective Geo-replicated Storage Spanning Multiple Cloud Services,” in ACM
Symposium on Operating Systems Principles (SOSP), 2013, pp. 292–308.
A. Beimel, “Secret-sharing schemes: A survey,” in Interna- tional Workshop on Coding
and Cryptology (IWCC), 2011, pp. 11–46.
H. Krawczyk, “Secret Sharing Made Short,” in Advances in Cryptology (CRYPTO),
1993, pp. 136–146.
7/14/2019 25
Department of Computer Engg., SITS Narhe
Department of Computer Engg., SITS Narhe 7/14/2019 26