Skip to main navigation Skip to search Skip to main content

D-DOG: Securing sensitive data in distributed storage space by data division and out-of-order keystream generation

  • Jun Feng
  • , Yu Chen
  • , Wei Shinn Ku
  • , Zhou Su

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Migrating from server-attached storage to distributed storage brings new vulnerabilities in creating a secure data storage and access facility. Particularly it is a challenge on top of insecure networks or unreliable storage service providers. For example, in applications such as cloud computing where data storage is transparent to the owner. It is even harder to protect the data stored in unreliable hosts. More robust security scheme is desired to prevent adversaries from obtaining sensitive information when the data is in their hands. Meanwhile, the performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution to close the performance gap is through hardware implementation. This paper proposes D-DOG (Data Division and Out-of-order keystream Generation), a novel encryption method to protect data in the distributed storage environments. Aside from verifying the correctness and effectiveness of the D-DOG scheme through theoretical analysis and experimental study, we also preliminarily evaluated its hardware implementation.

Original languageEnglish
Title of host publication2010 IEEE International Conference on Communications, ICC 2010
DOIs
StatePublished - 2010
Event2010 IEEE International Conference on Communications, ICC 2010 - Cape Town, South Africa
Duration: May 23 2010May 27 2010

Publication series

NameIEEE International Conference on Communications

Conference

Conference2010 IEEE International Conference on Communications, ICC 2010
Country/TerritorySouth Africa
CityCape Town
Period05/23/1005/27/10

Keywords

  • Data security
  • Distributed storage
  • Encryption/decryption
  • Stream cipher

Fingerprint

Dive into the research topics of 'D-DOG: Securing sensitive data in distributed storage space by data division and out-of-order keystream generation'. Together they form a unique fingerprint.

Cite this