A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults

Author(s):  
Cheng Zhang ◽  
Yang Xu ◽  
Yupeng Hu ◽  
J. Wu ◽  
Ju Ren ◽  
...  
Author(s):  
Leonel Moyou Metcheka ◽  
René Ndoundam

AbstractClassical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message and embedding each secret piece into a distinct cover media. The major interest of this approach is to make the secret message detection extremely difficult. However, these file modifications leave fingerprints which can reveal a secret channel to an attacker. Our contribution is a new steganography paradigm transparent to any attacker and resistant to the detection and the secret extraction. Two properties contribute to achieve these goals: the files do not undergo any modification while the distribution of the secret in the multi-cloud storage environment allows us to hide the existence of the covert channel between the communicating parties. Information’s are usually hidden inside the cover media. In this work, the covert media is a pointer to information. Therefore the file carries the information without being modified and the only way to access it is to have the key. Experiments show interesting comparison results with remarkable security contributions. The work can be seen as a new open direction for further research in the field.


2017 ◽  
Vol 30 (16) ◽  
pp. e3324 ◽  
Author(s):  
Laicheng Cao ◽  
Wenwen He ◽  
Yufei Liu ◽  
Xian Guo ◽  
Tao Feng

2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Jian Mao ◽  
Wenqian Tian ◽  
Yan Zhang ◽  
Jian Cui ◽  
Hanjun Ma ◽  
...  

With the increasing demand for ubiquitous connectivity, wireless technology has significantly improved our daily lives. Meanwhile, together with cloud-computing technology (e.g., cloud storage services and big data processing), new wireless networking technology becomes the foundation infrastructure of emerging communication networks. Particularly, cloud storage has been widely used in services, such as data outsourcing and resource sharing, among the heterogeneous wireless environments because of its convenience, low cost, and flexibility. However, users/clients lose the physical control of their data after outsourcing. Consequently, ensuring the integrity of the outsourced data becomes an important security requirement of cloud storage applications. In this paper, we present Co-Check, a collaborative multicloud data integrity audition scheme, which is based on BLS (Boneh-Lynn-Shacham) signature and homomorphic tags. According to the proposed scheme, clients can audit their outsourced data in a one-round challenge-response interaction with low performance overhead. Our scheme also supports dynamic data maintenance. The theoretical analysis and experiment results illustrate that our scheme is provably secure and efficient.


Author(s):  
Maxim Deryabin ◽  
Nikolay Chervyakov ◽  
Andrei Tchernykh ◽  
Mikhail Babenko ◽  
Nikolay Kucherov ◽  
...  

2015 ◽  
Vol 114 (8) ◽  
pp. 10-16
Author(s):  
Megha Mayreddy ◽  
B.Tarakeswara Rao
Keyword(s):  

Author(s):  
Ranjith Kumar Marrikukkala ◽  
Dr. P. Praveen ◽  
Bonthala Prabhanjan Yadav ◽  
G Jhansi ◽  
P. Venkata Ramana Rao

Author(s):  
Lu Shen ◽  
Shifang Feng ◽  
Jinjin Sun ◽  
Zhongwei Li ◽  
Gang Wang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document