Skip to main content

A Model of Survivable Storage System Based on Information Hiding

  • Conference paper
Book cover Wireless Communications and Applications (ICWCA 2011)

Abstract

A new model of survivable storage system based on the information hiding, which is called SSSBIH, is presented in this paper, This SSSBIH model is derived from the PASIS model. SSSBIH model can make stored data more security than PASIS model. We design the information hiding function in client agent and describe its principle of work in this paper. Note that data tampering from internal intruders is difficult to be detected nowadays. The information hiding function can detect tampering whatever any user accesses the data. With threshold themes, our model can carry out effective recovery for tampered data. Our model also doesn’t need the history pool of the old data versions. This can save the storage space of storage nodes. At last, we give out an information hiding algorithm based on the discrete cosine transformation and make a simulation. In short, our model can enhance data credibility, survivability and security of a storage system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stanton, P.: Securing Data in Storage: A Review of Current Research, http://www.projects.ncassr.org/storage-ec/papers/stantontechnicalreport2004.pdf

  2. Chockler, G., Lynch, N.: Fault-Tolerant Distributed Storage. MIT Computer Science and Artificial Intelligence Laboratory (2004)

    Google Scholar 

  3. Suhail, M.A., Obaidat, M.S.: Digital Watermarking-Based DCT and JPEG Model. IEEE Transactions on Instrumentation and Measurement 52(5) (October 2003)

    Google Scholar 

  4. Gregory, R., et al.: Survivable Storage Systems. In: DARPA Information Survivability Conference and Exposition, Anaheim, CA, June 12-14, vol. 2, pp. 184–195. IEEE, Los Alamitos (2001)

    Chapter  Google Scholar 

  5. Wylie, J.J., Bigrigg, M.W., Strunk, J.D., Ganger, G.R., Kılıççöte, H., Khosla, P.K.: Information Storage Systems, Computer, Carnegie Mellon University (August 2000)

    Google Scholar 

  6. Hayashi, D., Miyamoto, T., Doi, S., Kumagai, S.: Agents for Autonomous Distributed Secret Sharing Storage System. In: Proc. 2002 International Conference on Circuit/Systems Computers and Communications (2002), http://www.kmutt.ac.th/itc2002/CD/pdf/17_07_45/WP1_PJ/6.pdf

  7. Goodson, G.R., Wylie, J.J., Ganger, G.R., Reiter, M.K.: Efficient Byzantine-tolerant erasure-coded storage. Appears in the Proceedings of the International Conference on Dependable Systems and Networks, Carnegie Mellon University (June 2004)

    Google Scholar 

  8. Strunk, J.D., Goodson, G.R., Scheinholtz, M.L., Soules, C.A.N., Ganger, G.R.: Self-Securing Storage:Protecting Data in Compromised Systems. In: Proceedings of the Foundations of Intrusion Tolerant Systems (OASIS 2003), Carnegie Mellon University. IEEE, Los Alamitos (2003)

    Google Scholar 

  9. Maheshwari, U., Vingralek, R., Shapiro, W.: How to Build a Trusted Database System on Untrusted Storage, http://www.usenix.org/events/osdi00/full_papers/maheshwari/maheshwari.pdf

  10. Riedel, E., Kallahalla, M., Swaminathan, R.: A framework for evaluating storage system security. Appears in the Proceedings of the 1st Conference on File and Storage Technologies (FAST), Hewlett-Packard Laboratories, Palo Alto, California, Monterey, CA (January 2002)

    Google Scholar 

  11. Xu, L.: Hydra: A Platform for Survivable and Secure Data Storage Systems. In: Proceedings of the 2005 ACM workshop on Storage security and survivability, Virginia, USA, November 11 (2005)

    Google Scholar 

  12. Lakshmanan, S., Ahamad, M., Venkateswaran, H.: Responsive Security for Stored Data. IEEE Transactions On Parallel And Distributed Systems 14(9) (September 2003)

    Google Scholar 

  13. Zhu, J., Wang, C., Ma, J.: Intrusion-Tolerant Based Survivable Model of Database System. Chinese Journal of Electronics 14(3) (July 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Zhang, Q., Zhu, J., Wang, Y. (2012). A Model of Survivable Storage System Based on Information Hiding. In: Sénac, P., Ott, M., Seneviratne, A. (eds) Wireless Communications and Applications. ICWCA 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 72. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29157-9_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29157-9_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29156-2

  • Online ISBN: 978-3-642-29157-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics