Skip to main content
Top
Published in: The Journal of Supercomputing 3/2014

01-03-2014

A secure file sharing service for distributed computing environments

Authors: Aniello Castiglione, Luigi Catuogno, Aniello Del Sorbo, Ugo Fiore, Francesco Palmieri

Published in: The Journal of Supercomputing | Issue 3/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Distributed cryptographic file systems enable file sharing among their users and need the adoption of a key management scheme for the distribution of the cryptographic keys to authorized users according to their specific degree of trust. In this paper we describe the architecture of a basic secure file sharing facility relying on a multi-party threshold-based key-sharing scheme that can be overlaid on top of the existing stackable networked file systems, and discuss its application to the implementation of distributed cryptographic file systems. It provides flexible access control policies supporting multiple combination of roles and trust profiles. A proof of concept prototype implementation within the Linux operating system framework demonstrated its effectiveness in terms of performance and security robustness.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Al Hasib A, Haque A (2008) A comparative study of the performance and security issues of aes and rsa cryptography. In: Third international conference on convergence and hybrid information technology, 2008, ICCIT ’08, vol 2, pp 505–510. doi:10.1109/ICCIT.2008.179 CrossRef Al Hasib A, Haque A (2008) A comparative study of the performance and security issues of aes and rsa cryptography. In: Third international conference on convergence and hybrid information technology, 2008, ICCIT ’08, vol 2, pp 505–510. doi:10.​1109/​ICCIT.​2008.​179 CrossRef
2.
go back to reference Badulescu I, Shender A, Zadok E (1998) Cryptfs: a stackable vnode level encryption file system. Department of Computer Science, Columbia University, Columbia University Computer Science Report CUCS-02198 Badulescu I, Shender A, Zadok E (1998) Cryptfs: a stackable vnode level encryption file system. Department of Computer Science, Columbia University, Columbia University Computer Science Report CUCS-02198
4.
go back to reference Biryukov A, Kushilevitz E (1998) From differential cryptanalysis to ciphertext-only attacks. In: Krawczyk H (ed) Advances in cryptology, CRYPTO ’98. Lecture notes in computer science, vol 1462. Springer, Berlin, pp 72–88. doi:10.1007/BFb0055721 CrossRef Biryukov A, Kushilevitz E (1998) From differential cryptanalysis to ciphertext-only attacks. In: Krawczyk H (ed) Advances in cryptology, CRYPTO ’98. Lecture notes in computer science, vol 1462. Springer, Berlin, pp 72–88. doi:10.​1007/​BFb0055721 CrossRef
5.
go back to reference Blaze M (1993) A cryptographic file system for UNIX. In: Proceedings of the 1st ACM conference on computer and communications security, CCS ’93. ACM, New York, pp 9–16. doi:10.1145/168588.168590 Blaze M (1993) A cryptographic file system for UNIX. In: Proceedings of the 1st ACM conference on computer and communications security, CCS ’93. ACM, New York, pp 9–16. doi:10.​1145/​168588.​168590
6.
go back to reference Blaze M (1994) Key management in an encrypting file system. In: Proceedings of the summer 1994 USENIX conference, pp 27–35 Blaze M (1994) Key management in an encrypting file system. In: Proceedings of the summer 1994 USENIX conference, pp 27–35
7.
go back to reference Boneh D, Franklin M (1997) Efficient generation of shared RSA keys. In: Kaliski Jr BS (ed) Advances in cryptology, CRYPTO ’97. Lecture notes in computer science, vol 1294. Springer, Berlin, pp 425–439. doi:10.1007/BFb0052253 CrossRef Boneh D, Franklin M (1997) Efficient generation of shared RSA keys. In: Kaliski Jr BS (ed) Advances in cryptology, CRYPTO ’97. Lecture notes in computer science, vol 1294. Springer, Berlin, pp 425–439. doi:10.​1007/​BFb0052253 CrossRef
8.
go back to reference Castiglione A, Cepparulo M, De Santis A, Palmieri F (2010) Towards a lawfully secure and privacy preserving video surveillance system. In: Buccafurri F, Semeraro G (eds) E-commerce and web technologies. Lecture notes in business information processing, vol 61. Springer, Berlin, pp 73–84. doi:10.1007/978-3-642-15208-5_7 CrossRef Castiglione A, Cepparulo M, De Santis A, Palmieri F (2010) Towards a lawfully secure and privacy preserving video surveillance system. In: Buccafurri F, Semeraro G (eds) E-commerce and web technologies. Lecture notes in business information processing, vol 61. Springer, Berlin, pp 73–84. doi:10.​1007/​978-3-642-15208-5_​7 CrossRef
9.
go back to reference Castiglione A, De Prisco R, De Santis A (2009) Do you trust your phone? In: Noia TD, Buccafurri F (eds) EC-web. Lecture notes in computer science, vol 5692. Springer, Berlin, pp 50–61 Castiglione A, De Prisco R, De Santis A (2009) Do you trust your phone? In: Noia TD, Buccafurri F (eds) EC-web. Lecture notes in computer science, vol 5692. Springer, Berlin, pp 50–61
10.
go back to reference Castiglione A, De Santis A, Soriente C (2007) Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J Syst Softw 80(5):750–764 CrossRef Castiglione A, De Santis A, Soriente C (2007) Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J Syst Softw 80(5):750–764 CrossRef
11.
go back to reference Castiglione A, De Santis A, Soriente C (2010) Security and privacy issues in the portable document format. J Syst Softw 83(10):1813–1822 CrossRef Castiglione A, De Santis A, Soriente C (2010) Security and privacy issues in the portable document format. J Syst Softw 83(10):1813–1822 CrossRef
12.
go back to reference Deswarte Y, Blain L, Fabre JC (1991) Intrusion tolerance in distributed computing systems. In: Proceedings of IEEE computer society symposium on research in security and privacy, 1991, pp 110–121. doi:10.1109/RISP.1991.130780 CrossRef Deswarte Y, Blain L, Fabre JC (1991) Intrusion tolerance in distributed computing systems. In: Proceedings of IEEE computer society symposium on research in security and privacy, 1991, pp 110–121. doi:10.​1109/​RISP.​1991.​130780 CrossRef
14.
go back to reference Howard JH et al. (1988) An overview of the Andrew file system. Carnegie Mellon University, Information Technology Center Howard JH et al. (1988) An overview of the Andrew file system. Carnegie Mellon University, Information Technology Center
16.
go back to reference Institute, A.N.S.: Triple data encryption algorithm modes of operation. ANSI X9.52-1998 (2001) Institute, A.N.S.: Triple data encryption algorithm modes of operation. ANSI X9.52-1998 (2001)
17.
go back to reference Lindamood J, Heatherly R, Kantarcioglu M, Thuraisingham B (2009) Inferring private information using social network data. In: Proceedings of the 18th international conference on World wide web, WWW ’09. ACM, New York, pp 1145–1146. doi:10.1145/1526709.1526899 CrossRef Lindamood J, Heatherly R, Kantarcioglu M, Thuraisingham B (2009) Inferring private information using social network data. In: Proceedings of the 18th international conference on World wide web, WWW ’09. ACM, New York, pp 1145–1146. doi:10.​1145/​1526709.​1526899 CrossRef
19.
go back to reference Menezes AJ, Van Oorschot PC, Vanstone SA (2010) Handbook of applied cryptography. CRC Press, Boca Raton Menezes AJ, Van Oorschot PC, Vanstone SA (2010) Handbook of applied cryptography. CRC Press, Boca Raton
20.
go back to reference Nagata A, Yamamura S, Tsuru M (2012) Data transfer exploiting multiple heterogeneous challenged networks—implementation and application. IJSSC 2(2):112–122 CrossRef Nagata A, Yamamura S, Tsuru M (2012) Data transfer exploiting multiple heterogeneous challenged networks—implementation and application. IJSSC 2(2):112–122 CrossRef
21.
go back to reference Rejewski M, Kozaczuk W (1984) Summary of our methods for reconstructing ENIGMA and reconstructing daily keys, and of German efforts to frustrate those methods. Enigma: how the German cipher machine was broken, and how it was read by the Allies in World War II, pp 241–245 Rejewski M, Kozaczuk W (1984) Summary of our methods for reconstructing ENIGMA and reconstructing daily keys, and of German efforts to frustrate those methods. Enigma: how the German cipher machine was broken, and how it was read by the Allies in World War II, pp 241–245
22.
go back to reference Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on computer and communications security, CCS ’09. ACM, New York, pp 199–212. doi:10.1145/1653662.1653687 CrossRef Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on computer and communications security, CCS ’09. ACM, New York, pp 199–212. doi:10.​1145/​1653662.​1653687 CrossRef
25.
go back to reference Sabzevar AP, Sousa JP (2011) Authentication, authorisation and auditing for ubiquitous computing: a survey and vision. IJSSC 1(1):59–67 CrossRef Sabzevar AP, Sousa JP (2011) Authentication, authorisation and auditing for ubiquitous computing: a survey and vision. IJSSC 1(1):59–67 CrossRef
26.
go back to reference Sandber R, Goldberg D, Kleiman S, Walsh D, Lyon B (1985) Design and implementation of the sun network file system. In: Proceedings of USENIX summer conference, pp 119–130 Sandber R, Goldberg D, Kleiman S, Walsh D, Lyon B (1985) Design and implementation of the sun network file system. In: Proceedings of USENIX summer conference, pp 119–130
29.
go back to reference Stallings W (2003) Cryptography and network security, principles and practices. Prentice Hall, New York Stallings W (2003) Cryptography and network security, principles and practices. Prentice Hall, New York
30.
go back to reference National Institute of Standards and Technology: advanced encryption standard. NIST FIPS PUB 197 (2001) National Institute of Standards and Technology: advanced encryption standard. NIST FIPS PUB 197 (2001)
32.
go back to reference US Department of Commerce/National Bureau of Standards, National Technical Information Service: DES modes of operation. Federal Information Processing Standards (1980) US Department of Commerce/National Bureau of Standards, National Technical Information Service: DES modes of operation. Federal Information Processing Standards (1980)
33.
go back to reference Wu T, Malkin M, Boneh D (1999) Building intrusion tolerant applications. In: Proceedings of the 8th conference on USENIX security symposium, SSYM99, vol 8. USENIX Association, Berkeley, p 7 Wu T, Malkin M, Boneh D (1999) Building intrusion tolerant applications. In: Proceedings of the 8th conference on USENIX security symposium, SSYM99, vol 8. USENIX Association, Berkeley, p 7
Metadata
Title
A secure file sharing service for distributed computing environments
Authors
Aniello Castiglione
Luigi Catuogno
Aniello Del Sorbo
Ugo Fiore
Francesco Palmieri
Publication date
01-03-2014
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 3/2014
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-013-0975-y

Other articles of this Issue 3/2014

The Journal of Supercomputing 3/2014 Go to the issue

Premium Partner