The Journal of Supercomputing

, Volume 67, Issue 3, pp 691–710 | Cite as

A secure file sharing service for distributed computing environments

  • Aniello Castiglione
  • Luigi Catuogno
  • Aniello Del Sorbo
  • Ugo Fiore
  • Francesco Palmieri
Article

Abstract

Distributed cryptographic file systems enable file sharing among their users and need the adoption of a key management scheme for the distribution of the cryptographic keys to authorized users according to their specific degree of trust. In this paper we describe the architecture of a basic secure file sharing facility relying on a multi-party threshold-based key-sharing scheme that can be overlaid on top of the existing stackable networked file systems, and discuss its application to the implementation of distributed cryptographic file systems. It provides flexible access control policies supporting multiple combination of roles and trust profiles. A proof of concept prototype implementation within the Linux operating system framework demonstrated its effectiveness in terms of performance and security robustness.

Keywords

Distributed file system Key escrow Key management/distribution Threshold based schemes Grid computing 

References

  1. 1.
    Al Hasib A, Haque A (2008) A comparative study of the performance and security issues of aes and rsa cryptography. In: Third international conference on convergence and hybrid information technology, 2008, ICCIT ’08, vol 2, pp 505–510. doi: 10.1109/ICCIT.2008.179 CrossRefGoogle Scholar
  2. 2.
    Badulescu I, Shender A, Zadok E (1998) Cryptfs: a stackable vnode level encryption file system. Department of Computer Science, Columbia University, Columbia University Computer Science Report CUCS-02198 Google Scholar
  3. 3.
    Barolli L, Takizawa M (2010) Special issue on emerging trends in ubiquitous computing systems. J Ambient Intell Humaniz Comput 1(4):235–237. doi: 10.1007/s12652-010-0026-y CrossRefGoogle Scholar
  4. 4.
    Biryukov A, Kushilevitz E (1998) From differential cryptanalysis to ciphertext-only attacks. In: Krawczyk H (ed) Advances in cryptology, CRYPTO ’98. Lecture notes in computer science, vol 1462. Springer, Berlin, pp 72–88. doi: 10.1007/BFb0055721 CrossRefGoogle Scholar
  5. 5.
    Blaze M (1993) A cryptographic file system for UNIX. In: Proceedings of the 1st ACM conference on computer and communications security, CCS ’93. ACM, New York, pp 9–16. doi: 10.1145/168588.168590 Google Scholar
  6. 6.
    Blaze M (1994) Key management in an encrypting file system. In: Proceedings of the summer 1994 USENIX conference, pp 27–35 Google Scholar
  7. 7.
    Boneh D, Franklin M (1997) Efficient generation of shared RSA keys. In: Kaliski Jr BS (ed) Advances in cryptology, CRYPTO ’97. Lecture notes in computer science, vol 1294. Springer, Berlin, pp 425–439. doi: 10.1007/BFb0052253 CrossRefGoogle Scholar
  8. 8.
    Castiglione A, Cepparulo M, De Santis A, Palmieri F (2010) Towards a lawfully secure and privacy preserving video surveillance system. In: Buccafurri F, Semeraro G (eds) E-commerce and web technologies. Lecture notes in business information processing, vol 61. Springer, Berlin, pp 73–84. doi: 10.1007/978-3-642-15208-5_7 CrossRefGoogle Scholar
  9. 9.
    Castiglione A, De Prisco R, De Santis A (2009) Do you trust your phone? In: Noia TD, Buccafurri F (eds) EC-web. Lecture notes in computer science, vol 5692. Springer, Berlin, pp 50–61 Google Scholar
  10. 10.
    Castiglione A, De Santis A, Soriente C (2007) Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J Syst Softw 80(5):750–764 CrossRefGoogle Scholar
  11. 11.
    Castiglione A, De Santis A, Soriente C (2010) Security and privacy issues in the portable document format. J Syst Softw 83(10):1813–1822 CrossRefGoogle Scholar
  12. 12.
    Deswarte Y, Blain L, Fabre JC (1991) Intrusion tolerance in distributed computing systems. In: Proceedings of IEEE computer society symposium on research in security and privacy, 1991, pp 110–121. doi: 10.1109/RISP.1991.130780 CrossRefGoogle Scholar
  13. 13.
    French T, Bessis N, Xhafa F, Maple C (2011) Towards a corporate governance trust agent scoring model for collaborative virtual organisations. Int J Grid Util Comput 2(2):98–108. doi: 10.1504/IJGUC.2011.040597 CrossRefGoogle Scholar
  14. 14.
    Howard JH et al. (1988) An overview of the Andrew file system. Carnegie Mellon University, Information Technology Center Google Scholar
  15. 15.
    Hsu CH (2012) Ubiquitous intelligence and computing: building smart environment in real and cyber space. J Ambient Intell Humaniz Comput 3(2):83–85. doi: 10.1007/s12652-011-0074-y CrossRefGoogle Scholar
  16. 16.
    Institute, A.N.S.: Triple data encryption algorithm modes of operation. ANSI X9.52-1998 (2001) Google Scholar
  17. 17.
    Lindamood J, Heatherly R, Kantarcioglu M, Thuraisingham B (2009) Inferring private information using social network data. In: Proceedings of the 18th international conference on World wide web, WWW ’09. ACM, New York, pp 1145–1146. doi: 10.1145/1526709.1526899 CrossRefGoogle Scholar
  18. 18.
    Mazières D, Kaminsky M, Kaashoek MF, Witchel E (1999) Separating key management from file system security. SIGOPS Oper Syst Rev 33(5):124–139. doi: 10.1145/319344.319160 CrossRefGoogle Scholar
  19. 19.
    Menezes AJ, Van Oorschot PC, Vanstone SA (2010) Handbook of applied cryptography. CRC Press, Boca Raton Google Scholar
  20. 20.
    Nagata A, Yamamura S, Tsuru M (2012) Data transfer exploiting multiple heterogeneous challenged networks—implementation and application. IJSSC 2(2):112–122 CrossRefGoogle Scholar
  21. 21.
    Rejewski M, Kozaczuk W (1984) Summary of our methods for reconstructing ENIGMA and reconstructing daily keys, and of German efforts to frustrate those methods. Enigma: how the German cipher machine was broken, and how it was read by the Allies in World War II, pp 241–245 Google Scholar
  22. 22.
    Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on computer and communications security, CCS ’09. ACM, New York, pp 199–212. doi: 10.1145/1653662.1653687 CrossRefGoogle Scholar
  23. 23.
    Russinovich M (1999) Inside encrypting file system, Part 1. http://windowsitpro.com/systems-management/inside-encrypting-file-system-part-1
  24. 24.
    Russinovich M (1999) Inside encrypting file system, Part 2. http://windowsitpro.com/systems-management/inside-encrypting-file-system-part-2
  25. 25.
    Sabzevar AP, Sousa JP (2011) Authentication, authorisation and auditing for ubiquitous computing: a survey and vision. IJSSC 1(1):59–67 CrossRefGoogle Scholar
  26. 26.
    Sandber R, Goldberg D, Kleiman S, Walsh D, Lyon B (1985) Design and implementation of the sun network file system. In: Proceedings of USENIX summer conference, pp 119–130 Google Scholar
  27. 27.
    Satyanarayanan M (1989) Integrating security in a large distributed system. ACM Trans Comput Syst 7(3):247–280. doi: 10.1145/65000.65002 CrossRefGoogle Scholar
  28. 28.
    Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613. doi: 10.1145/359168.359176 CrossRefMATHMathSciNetGoogle Scholar
  29. 29.
    Stallings W (2003) Cryptography and network security, principles and practices. Prentice Hall, New York Google Scholar
  30. 30.
    National Institute of Standards and Technology: advanced encryption standard. NIST FIPS PUB 197 (2001) Google Scholar
  31. 31.
    The OpenSSL Project: OpenSSL: The open source toolkit for SSL/TLS (2003). www.openssl.org
  32. 32.
    US Department of Commerce/National Bureau of Standards, National Technical Information Service: DES modes of operation. Federal Information Processing Standards (1980) Google Scholar
  33. 33.
    Wu T, Malkin M, Boneh D (1999) Building intrusion tolerant applications. In: Proceedings of the 8th conference on USENIX security symposium, SSYM99, vol 8. USENIX Association, Berkeley, p 7 Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Aniello Castiglione
    • 1
  • Luigi Catuogno
    • 1
  • Aniello Del Sorbo
    • 1
  • Ugo Fiore
    • 2
  • Francesco Palmieri
    • 3
  1. 1.Dipartimento di InformaticaUniversità di SalernoFiscianoItaly
  2. 2.Centro di Ateneo per i Servizi InformativiUniversità di Napoli Federico IINapoliItaly
  3. 3.Dipartimento di Ingegneria Industriale e dell’InformazioneSeconda Università di NapoliAversaItaly

Personalised recommendations