Abstract
In recent times, cloud storage and distributed system have risen to great success owing to their easy use and availability to users. These have helped users to gain access to their data anywhere, anytime solely with the help of internet. But all these features come with greater risks and security threats. Traditional data security methods cannot be considered fully reliable given the advancements in cryptanalysis techniques and sophistication of cyber-attacks. Encryption alone is insufficient to ensure data security and integrity. In this paper, we provide an approach to create a secure distributed file system. We propose a two-layer architecture where the data will first involve interaction with the server. Once we ensure authenticity and integrity of the data, the next step involves storing it securely on the cloud which involves interaction of server with the distributed system which will be completely abstract for the user. The first layer makes the use of digital signature for client authentication and data integrity. The second layer will make use of attribute-based distributed storage of data in encrypted form with hashing techniques to remove redundancy in the data stored in the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mar KK, Hu ZQ, Law CY, Wang M (2016) Secure Cloud Distributed File System. In: The 11th international conference for internet technology and secured transactions (ICITST)
Storer MW, Greenan KM, Miller EL, Voruganti K (2008) POTSHARDS: secure long-term storage without encryption. In: 2007 USENIX annual technical conference
Krawczyk H (1993) Secret sharing made short. In: Annual international cryptology conference, pp 136–146
The process behind Cleversafe’s object storage platform, Cleversafe. https://www.cleversafe.com/platform/how-itworks
Bian J Seker R (2009) Jigdfs: a secure distributed file system. In: IEEE symposium on computational intelligence in cyber security (CICS’09), pp 76–82
Garay JA, Gennaro R, Jutla C, Rabin T (2000) Secure distributed storage and retrieval. Theor Comput Sci 243(1–2):363–389
Rabin MO (1989) Efficient dispersal of information for security, load balancing, and fault tolerance. J ACM 36(2):335–348
Chi L, Zhu X (2017) Hashing techniques. ACM Comput Surv 50(1):1–36
Thejaswi S, Westrup C (2016) Approximate computation of frequency moments, Aalto University, 1 Jan 2016
Yann Collet. https://github.com/Cyan4973/xxHash
Bernstein DJ Curve25519: New Diffie-Hellman speed records. Lecture Notes in Computer Science, pp 207–228
Padmavathi B, Kumari SR (2013) A survey on performance analysis of DES, AES and RSA algorithm along with LSB substitution technique. Int J Sci Res (IJSR), India
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Sharma, M., Jain, P., Kakrania, A., Choubey, H., Lavanya, K. (2020). Distributed Secure File Storage System Using Cryptography. In: Saini, H., Sayal, R., Buyya, R., Aliseri, G. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 103. Springer, Singapore. https://doi.org/10.1007/978-981-15-2043-3_3
Download citation
DOI: https://doi.org/10.1007/978-981-15-2043-3_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2042-6
Online ISBN: 978-981-15-2043-3
eBook Packages: EngineeringEngineering (R0)