Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2007: Data and Applications Security XXI pp 161–176Cite as

  1. Home
  2. Data and Applications Security XXI
  3. Conference paper
gVault: A Gmail Based Cryptographic Network File System

gVault: A Gmail Based Cryptographic Network File System

  • Ravi Chandra Jammalamadaka1,
  • Roberto Gamboni3,
  • Sharad Mehrotra1,
  • Kent E. Seamons2 &
  • …
  • Nalini Venkatasubramanian1 
  • Conference paper
  • 1352 Accesses

  • 7 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4602)

Abstract

In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a file system effectively provides users with an easily accessible free network drive on the Internet. gVault provides numerous benefits to the users, including: a) Secure remote access: Users can access their data securely from any machine connected to the Internet; b) Availability: The data is available 24/7; and c) Storage capacity: Gmail provides a large amount of storage space to each user. In this paper, we address the challenges in design and implementation of gVault. gVault is fundamentally designed keeping an average user in mind. We introduce a novel encrypted storage model and key management techniques that ensure data confidentiality and integrity. An initial prototype of gVault is implemented to evaluate the feasibility of such a system. Our experiments indicate that the additional cost of security is negligible in comparison to the cost of data transfer.

Keywords

  • File System
  • Server Side
  • Client Side
  • Encrypt Data
  • Version Number

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Chapter PDF

Download to read the full chapter text

References

  1. Gmail Drive, http://www.viksoe.dk/code/gmail.htm

  2. http://www.roamdrive.com

  3. Merkle, R.: Protocols for public key cryptosystems. In: IEEE security and privacy, IEEE Computer Society Press, Los Alamitos (2000)

    Google Scholar 

  4. Gmail program policies, http://mail.google.com/mail/help/intl/en/program_policies.html

  5. Man Jailed after Yahoo Handed Draft Email to China. http://www.ctv.ca/servlet/ArticleNews/story/CTVNews/20060419/yahoo_jail_ap_060419/20060419?hub=World

  6. Blaze, M.: A cryptographic file system for UNIX. In: Proceedings of the 1st ACM conference on Computer and communications security, ACM Press, New York

    Google Scholar 

  7. Goh, E.j.: Secure Indexes (in submission)

    Google Scholar 

  8. RSA Laboraties. PKCS #5 V2.1: Password Based Cryptography Standard, ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-5v2/pkcs5v2_1.pdf

  9. Song, D., Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: 2000 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos (2000)

    Google Scholar 

  10. Britney, A.: The 2001 Information Security Industry Survey 2001 (cited, October 20, 2002), http://www.infosecuritymag.com/archives2001.shtml

  11. Dhillon, G., Moores, S.: Computer crimes: theorizing about the enemy within. Computers & Security 20(8), 715–723

    Google Scholar 

  12. Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in the Database-Service-Provider Model. In: 2002 ACM SIGMOD Conference on Management of Data (June 2002)

    Google Scholar 

  13. Damiani, E., Vimercati, S.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proceedings of the 10th ACM conference on Computer and communications security, ACM Press, New York

    Google Scholar 

  14. Goh, E., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing remote untrusted storage. In: Goh, E., Shacham, H., Modadugu, N., Boneh, D. (eds.) Proc. Network and Distributed Systems Security (NDSS) Symposium (2003)

    Google Scholar 

  15. Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable secure file sharing on untrusted storage. In: Proc. 2nd USENIX Conference on File and Storage Technologies (FAST) (2003)

    Google Scholar 

  16. Zadok, E., Badulescu, I., Shender, A.: Cryptfs: A Stackable vnode level encryption file system. Technical Report, Columbia University (1998), CUCS-021-98

    Google Scholar 

  17. Shepler, S., Callaghan, B., Robinson, D., Thurlow, R., Beame, C., Eisler, M., Noveck, D.: NFS version 4 protocol. RFC 3530 (April 2003)

    Google Scholar 

  18. Cattaneo, A.D.S.G., Catuogno, L., Persiano, P.: Design and implementation of a transperant cryptographic file system for UNIX. In: FREENIX Track: 2001 Usenix annual technical conference (June 2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. University of California, Irvine, USA

    Ravi Chandra Jammalamadaka, Sharad Mehrotra & Nalini Venkatasubramanian

  2. Brigham Young University, USA

    Kent E. Seamons

  3. University of Bologna, Italy

    Roberto Gamboni

Authors
  1. Ravi Chandra Jammalamadaka
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Roberto Gamboni
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Sharad Mehrotra
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Kent E. Seamons
    View author publications

    You can also search for this author in PubMed Google Scholar

  5. Nalini Venkatasubramanian
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Steve Barker Gail-Joon Ahn

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 IFIP International Federation for Information Processing

About this paper

Cite this paper

Jammalamadaka, R.C., Gamboni, R., Mehrotra, S., Seamons, K.E., Venkatasubramanian, N. (2007). gVault: A Gmail Based Cryptographic Network File System. In: Barker, S., Ahn, GJ. (eds) Data and Applications Security XXI. DBSec 2007. Lecture Notes in Computer Science, vol 4602. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73538-0_13

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-540-73538-0_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73533-5

  • Online ISBN: 978-3-540-73538-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature