A secure file sharing service for distributed computing environments

Aniello Castiglione1, Luigi Catuogno1, Aniello Del Sorbo1, Ugo Fiore2, Francesco Palmieri3
1Dipartimento di Informatica, Università di Salerno, Fisciano, Italy
2Centro di Ateneo per i Servizi Informativi, Università di Napoli Federico II, Napoli, Italy
3Dipartimento di Ingegneria Industriale e dell’Informazione, Seconda Università di Napoli, Aversa, Italy

Tóm tắt

Từ khóa


Tài liệu tham khảo

Al Hasib A, Haque A (2008) A comparative study of the performance and security issues of aes and rsa cryptography. In: Third international conference on convergence and hybrid information technology, 2008, ICCIT ’08, vol 2, pp 505–510. doi: 10.1109/ICCIT.2008.179

Badulescu I, Shender A, Zadok E (1998) Cryptfs: a stackable vnode level encryption file system. Department of Computer Science, Columbia University, Columbia University Computer Science Report CUCS-02198

Barolli L, Takizawa M (2010) Special issue on emerging trends in ubiquitous computing systems. J Ambient Intell Humaniz Comput 1(4):235–237. doi: 10.1007/s12652-010-0026-y

Biryukov A, Kushilevitz E (1998) From differential cryptanalysis to ciphertext-only attacks. In: Krawczyk H (ed) Advances in cryptology, CRYPTO ’98. Lecture notes in computer science, vol 1462. Springer, Berlin, pp 72–88. doi: 10.1007/BFb0055721

Blaze M (1993) A cryptographic file system for UNIX. In: Proceedings of the 1st ACM conference on computer and communications security, CCS ’93. ACM, New York, pp 9–16. doi: 10.1145/168588.168590

Blaze M (1994) Key management in an encrypting file system. In: Proceedings of the summer 1994 USENIX conference, pp 27–35

Boneh D, Franklin M (1997) Efficient generation of shared RSA keys. In: Kaliski Jr BS (ed) Advances in cryptology, CRYPTO ’97. Lecture notes in computer science, vol 1294. Springer, Berlin, pp 425–439. doi: 10.1007/BFb0052253

Castiglione A, Cepparulo M, De Santis A, Palmieri F (2010) Towards a lawfully secure and privacy preserving video surveillance system. In: Buccafurri F, Semeraro G (eds) E-commerce and web technologies. Lecture notes in business information processing, vol 61. Springer, Berlin, pp 73–84. doi: 10.1007/978-3-642-15208-5_7

Castiglione A, De Prisco R, De Santis A (2009) Do you trust your phone? In: Noia TD, Buccafurri F (eds) EC-web. Lecture notes in computer science, vol 5692. Springer, Berlin, pp 50–61

Castiglione A, De Santis A, Soriente C (2007) Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J Syst Softw 80(5):750–764

Castiglione A, De Santis A, Soriente C (2010) Security and privacy issues in the portable document format. J Syst Softw 83(10):1813–1822

Deswarte Y, Blain L, Fabre JC (1991) Intrusion tolerance in distributed computing systems. In: Proceedings of IEEE computer society symposium on research in security and privacy, 1991, pp 110–121. doi: 10.1109/RISP.1991.130780

French T, Bessis N, Xhafa F, Maple C (2011) Towards a corporate governance trust agent scoring model for collaborative virtual organisations. Int J Grid Util Comput 2(2):98–108. doi: 10.1504/IJGUC.2011.040597

Howard JH et al. (1988) An overview of the Andrew file system. Carnegie Mellon University, Information Technology Center

Hsu CH (2012) Ubiquitous intelligence and computing: building smart environment in real and cyber space. J Ambient Intell Humaniz Comput 3(2):83–85. doi: 10.1007/s12652-011-0074-y

Institute, A.N.S.: Triple data encryption algorithm modes of operation. ANSI X9.52-1998 (2001)

Lindamood J, Heatherly R, Kantarcioglu M, Thuraisingham B (2009) Inferring private information using social network data. In: Proceedings of the 18th international conference on World wide web, WWW ’09. ACM, New York, pp 1145–1146. doi: 10.1145/1526709.1526899

Mazières D, Kaminsky M, Kaashoek MF, Witchel E (1999) Separating key management from file system security. SIGOPS Oper Syst Rev 33(5):124–139. doi: 10.1145/319344.319160

Menezes AJ, Van Oorschot PC, Vanstone SA (2010) Handbook of applied cryptography. CRC Press, Boca Raton

Nagata A, Yamamura S, Tsuru M (2012) Data transfer exploiting multiple heterogeneous challenged networks—implementation and application. IJSSC 2(2):112–122

Rejewski M, Kozaczuk W (1984) Summary of our methods for reconstructing ENIGMA and reconstructing daily keys, and of German efforts to frustrate those methods. Enigma: how the German cipher machine was broken, and how it was read by the Allies in World War II, pp 241–245

Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on computer and communications security, CCS ’09. ACM, New York, pp 199–212. doi: 10.1145/1653662.1653687

Russinovich M (1999) Inside encrypting file system, Part 1. http://windowsitpro.com/systems-management/inside-encrypting-file-system-part-1

Russinovich M (1999) Inside encrypting file system, Part 2. http://windowsitpro.com/systems-management/inside-encrypting-file-system-part-2

Sabzevar AP, Sousa JP (2011) Authentication, authorisation and auditing for ubiquitous computing: a survey and vision. IJSSC 1(1):59–67

Sandber R, Goldberg D, Kleiman S, Walsh D, Lyon B (1985) Design and implementation of the sun network file system. In: Proceedings of USENIX summer conference, pp 119–130

Satyanarayanan M (1989) Integrating security in a large distributed system. ACM Trans Comput Syst 7(3):247–280. doi: 10.1145/65000.65002

Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613. doi: 10.1145/359168.359176

Stallings W (2003) Cryptography and network security, principles and practices. Prentice Hall, New York

National Institute of Standards and Technology: advanced encryption standard. NIST FIPS PUB 197 (2001)

The OpenSSL Project: OpenSSL: The open source toolkit for SSL/TLS (2003). www.openssl.org

US Department of Commerce/National Bureau of Standards, National Technical Information Service: DES modes of operation. Federal Information Processing Standards (1980)

Wu T, Malkin M, Boneh D (1999) Building intrusion tolerant applications. In: Proceedings of the 8th conference on USENIX security symposium, SSYM99, vol 8. USENIX Association, Berkeley, p 7