Distributed Secure File Storage System Using Cryptography

  • Mayukh Sharma
  • Priyansh Jain
  • Anant Kakrania
  • Harshit Choubey
  • K. Lavanya
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 103)


In recent times, cloud storage and distributed system have risen to great success owing to their easy use and availability to users. These have helped users to gain access to their data anywhere, anytime solely with the help of internet. But all these features come with greater risks and security threats. Traditional data security methods cannot be considered fully reliable given the advancements in cryptanalysis techniques and sophistication of cyber-attacks. Encryption alone is insufficient to ensure data security and integrity. In this paper, we provide an approach to create a secure distributed file system. We propose a two-layer architecture where the data will first involve interaction with the server. Once we ensure authenticity and integrity of the data, the next step involves storing it securely on the cloud which involves interaction of server with the distributed system which will be completely abstract for the user. The first layer makes the use of digital signature for client authentication and data integrity. The second layer will make use of attribute-based distributed storage of data in encrypted form with hashing techniques to remove redundancy in the data stored in the system.


Digital signature Hashing Cloud storage Public-key cryptography Secure hash algorithm Information dispersal algorithm 


  1. 1.
    Mar KK, Hu ZQ, Law CY, Wang M (2016) Secure Cloud Distributed File System. In: The 11th international conference for internet technology and secured transactions (ICITST)Google Scholar
  2. 2.
    Storer MW, Greenan KM, Miller EL, Voruganti K (2008) POTSHARDS: secure long-term storage without encryption. In: 2007 USENIX annual technical conferenceGoogle Scholar
  3. 3.
    Krawczyk H (1993) Secret sharing made short. In: Annual international cryptology conference, pp 136–146Google Scholar
  4. 4.
    The process behind Cleversafe’s object storage platform, Cleversafe.
  5. 5.
    Bian J Seker R (2009) Jigdfs: a secure distributed file system. In: IEEE symposium on computational intelligence in cyber security (CICS’09), pp 76–82Google Scholar
  6. 6.
    Garay JA, Gennaro R, Jutla C, Rabin T (2000) Secure distributed storage and retrieval. Theor Comput Sci 243(1–2):363–389MathSciNetCrossRefGoogle Scholar
  7. 7.
    Rabin MO (1989) Efficient dispersal of information for security, load balancing, and fault tolerance. J ACM 36(2):335–348MathSciNetCrossRefGoogle Scholar
  8. 8.
    Chi L, Zhu X (2017) Hashing techniques. ACM Comput Surv 50(1):1–36CrossRefGoogle Scholar
  9. 9.
    Thejaswi S, Westrup C (2016) Approximate computation of frequency moments, Aalto University, 1 Jan 2016Google Scholar
  10. 10.
  11. 11.
    Bernstein DJ Curve25519: New Diffie-Hellman speed records. Lecture Notes in Computer Science, pp 207–228Google Scholar
  12. 12.
    Padmavathi B, Kumari SR (2013) A survey on performance analysis of DES, AES and RSA algorithm along with LSB substitution technique. Int J Sci Res (IJSR), IndiaGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Mayukh Sharma
    • 1
  • Priyansh Jain
    • 1
  • Anant Kakrania
    • 1
  • Harshit Choubey
    • 1
  • K. Lavanya
    • 1
  1. 1.Vellore Institute of TechnologyVelloreIndia

Personalised recommendations