Abstract
A new model of survivable storage system based on the information hiding, which is called SSSBIH, is presented in this paper, This SSSBIH model is derived from the PASIS model. SSSBIH model can make stored data more security than PASIS model. We design the information hiding function in client agent and describe its principle of work in this paper. Note that data tampering from internal intruders is difficult to be detected nowadays. The information hiding function can detect tampering whatever any user accesses the data. With threshold themes, our model can carry out effective recovery for tampered data. Our model also doesn’t need the history pool of the old data versions. This can save the storage space of storage nodes. At last, we give out an information hiding algorithm based on the discrete cosine transformation and make a simulation. In short, our model can enhance data credibility, survivability and security of a storage system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Stanton, P.: Securing Data in Storage: A Review of Current Research, http://www.projects.ncassr.org/storage-ec/papers/stantontechnicalreport2004.pdf
Chockler, G., Lynch, N.: Fault-Tolerant Distributed Storage. MIT Computer Science and Artificial Intelligence Laboratory (2004)
Suhail, M.A., Obaidat, M.S.: Digital Watermarking-Based DCT and JPEG Model. IEEE Transactions on Instrumentation and Measurement 52(5) (October 2003)
Gregory, R., et al.: Survivable Storage Systems. In: DARPA Information Survivability Conference and Exposition, Anaheim, CA, June 12-14, vol. 2, pp. 184–195. IEEE, Los Alamitos (2001)
Wylie, J.J., Bigrigg, M.W., Strunk, J.D., Ganger, G.R., Kılıççöte, H., Khosla, P.K.: Information Storage Systems, Computer, Carnegie Mellon University (August 2000)
Hayashi, D., Miyamoto, T., Doi, S., Kumagai, S.: Agents for Autonomous Distributed Secret Sharing Storage System. In: Proc. 2002 International Conference on Circuit/Systems Computers and Communications (2002), http://www.kmutt.ac.th/itc2002/CD/pdf/17_07_45/WP1_PJ/6.pdf
Goodson, G.R., Wylie, J.J., Ganger, G.R., Reiter, M.K.: Efficient Byzantine-tolerant erasure-coded storage. Appears in the Proceedings of the International Conference on Dependable Systems and Networks, Carnegie Mellon University (June 2004)
Strunk, J.D., Goodson, G.R., Scheinholtz, M.L., Soules, C.A.N., Ganger, G.R.: Self-Securing Storage:Protecting Data in Compromised Systems. In: Proceedings of the Foundations of Intrusion Tolerant Systems (OASIS 2003), Carnegie Mellon University. IEEE, Los Alamitos (2003)
Maheshwari, U., Vingralek, R., Shapiro, W.: How to Build a Trusted Database System on Untrusted Storage, http://www.usenix.org/events/osdi00/full_papers/maheshwari/maheshwari.pdf
Riedel, E., Kallahalla, M., Swaminathan, R.: A framework for evaluating storage system security. Appears in the Proceedings of the 1st Conference on File and Storage Technologies (FAST), Hewlett-Packard Laboratories, Palo Alto, California, Monterey, CA (January 2002)
Xu, L.: Hydra: A Platform for Survivable and Secure Data Storage Systems. In: Proceedings of the 2005 ACM workshop on Storage security and survivability, Virginia, USA, November 11 (2005)
Lakshmanan, S., Ahamad, M., Venkateswaran, H.: Responsive Security for Stored Data. IEEE Transactions On Parallel And Distributed Systems 14(9) (September 2003)
Zhu, J., Wang, C., Ma, J.: Intrusion-Tolerant Based Survivable Model of Database System. Chinese Journal of Electronics 14(3) (July 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Zhang, Q., Zhu, J., Wang, Y. (2012). A Model of Survivable Storage System Based on Information Hiding. In: Sénac, P., Ott, M., Seneviratne, A. (eds) Wireless Communications and Applications. ICWCA 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 72. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29157-9_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-29157-9_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29156-2
Online ISBN: 978-3-642-29157-9
eBook Packages: Computer ScienceComputer Science (R0)