Browse > Article

New Security Layer for OverLay Networks  

Imai, Hideki (Research Center for Information Seeurity (RCIS), National Institute of Advanced Industrial Seienee and Teehnology (AIST))
Shin, Seong-Han (Research Center for Information Seeurity (RCIS), National Institute of Advanced Industrial Seienee and Teehnology (AIST))
Kobara, Kazukuni (Research Center for Information Seeurity (RCIS), National Institute of Advanced Industrial Seienee and Teehnology (AIST))
Publication Information
Abstract
After clarifying the underlying problems in a secure network storage, we introduce two important requirements, leakageresilience and availability in higher levels respectively, for data keys that are used to protect remotely-stored data. As a main contribution of this paper, we give a new security layer for overlay networks by proposing a leakage-resilient authentication and data management system. In this system, we specifically propose a single mode and a cluster mode where the latter provides a higher level of both leakage-resilience and availability for the data key.
Keywords
Availability; leakage-resilience; network storage;
Citations & Related Records

Times Cited By Web Of Science : 0  (Related Records In Web of Science)
Times Cited By SCOPUS : 0
연도 인용수 순위
  • Reference
1 Amazon, 'Amazon simple storage servicc (Amazon S3).' [Online]. Availahlc: http://aws.amazon.com/s3
2 E. J. Goh, H. Shacham, N. Modadugu, and D. Bonch, 'SiRIUS: Securing remote untrusted storage,' in Proc. Network and Distributed System Security, 2003, pp.131-145
3 A. Heizmann, B. Palazzi, C. Paparnanthou, and R. Tamassia, 'Efficient integrity checking of untrusted network storage,' in Proc. 4th ACM International Workshop on Storage Security and Survivability, 2008, pp. 43-54
4 M. T. Goodrich, R. Tarnassia, and A. Schwerin, 'Implementatìon of an authenticated dictioinary with skip lists and cornrnutative hashing,' in Proc. DARPA Information Survívability Conference and Exposition II, 2001, pp.68-82
5 B. Ahoba, L. Blunk, J. Vollhrecht, J. Carlson, and H. Levkowetx, 'Extensible authentication protocol (EAP),' lETF RFC 3748, June 2004
6 C. Kaufman, 'Internel key exchange (TKEv2) protocol,' IETF RFC 4306, Dec.2005
7 R. Richardson, 'CSI survey 2007: The 12th annual computer crime and security survey,' Computer Security Institute, http://www.gocsi.com/forms/csi_survey.jhtml, 2007
8 E. Mykletun, M. Narasimha, and G. Tsudik, 'Authentication and integrity in outsourced datahases,' ACM Trans. Storage, vol. 2, no. 2, pp. 107-138, 2006   DOI
9 lETF, 'PPP extensible authentication protocol (EAP),' RFC 2284, March 1998
10 S. H. Shin, K. Kobara, and H. Imai, 'An efficient and Ieakage-resilient RSA-based authenticated key exchange protocol with tight security reduction,' IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences, vol. E90-A, no. 2, pp. 474-490, 2007   DOI   ScienceOn
11 Federal information processing standards publication 180-2, 'Secure hash standard (SHS),' Aug. 2002. [Online]. Available: http://csrc.nist.gov/publications/fips/fips 180-2/fips 180-2 withchangenotice.pdf
12 R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp.120-126, 1978   DOI   ScienceOn
13 S. H. Shin, K. Kobara, and H. Imai, 'A simple Ieakage-resilient authenticated key establishment protocol, its extensions, and applications,' IEICE Trans. Fund. Electronics, Commun. and Computer Sciences, vol. E88-A, no. 3, pp. 736-754, Mar. 2005   DOI   ScienceOn
14 E. L. Miller, W. E. Freeman, D. D. E. Long, and B. C. Reed, 'Strong security for network-attached storage,' in Proc. USENIX Conference on File and Storage Thchnologies, Jan. 2002
15 D. Boneh, C. Gentry, B. Lynn, and H. Shacharn, 'Aggregate and verifiably encrypted signatures from hilincar rnaps,' in Proc. Eurocrypt 2003, 2003, LNCS 2656, pp. 416-432
16 BitTorrent Inc., 'BitTorrent.' [Online]. Available: http://www.hittorrent.com
17 IEEE PI363.2, 'Standard specifications for password-based public key cryptographic techniques.' [Online]. Availahle: http://grouper.ieee.org/groups/ 1363/passwdPK/submissions.html
18 S. H. Shin, K. Kobara, and H. Imai, 'Leakage-resilient authenticated key establishment protocols,' in Proc. Asiacrypt 2003, 2003, LNCS 2894, pp. 155-172   DOI   ScienceOn
19 lEEE P1363, 'lEEE standard specifications for public key cryptography,' Nov. 1999
20 A. Frier, P. Karlton, and P. Kocher, 'The SSL 3.0 protocol, 'Netscape Communication Corp. [Online]. Availahle: http://wp.netscape.com/eng/ss13
21 D. Harkins and D. Carrel, 'The lnternet Key Exchange (IKE),' IETF RFC 2409, Nov. 1998. [Online]. Availahle: http://www.ietf.org/rfc/rfc2409.txt
22 M. Bellare, R. Canetti, and H. Krawczyk, 'Keying hash fucntions for message authentication,' in Proc. Crypto'96, 1996, LNCS 1109, pp. 1-15   DOI   ScienceOn
23 lETF, 'Transport layer security (tls) charter,' [Online]. Available: http://www .ietf.org/html.charters/tls-charter.html