Abstract:
After clarifying the underlying problems in a secure network storage, we introduce two important requirements, leakage-resilience and availability in higher levels respec...Show MoreMetadata
Abstract:
After clarifying the underlying problems in a secure network storage, we introduce two important requirements, leakage-resilience and availability in higher levels respectively, for data keys that are used to protect remotely-stored data. As a main contribution of this paper, we give a new security layer for overlay networks by proposing a leakage-resilient authentication and data management system. In this system, we specifically propose a single mode and a cluster mode where the latter provides a higher level of both leakage-resilience and availability for the data key.
Published in: Journal of Communications and Networks ( Volume: 11, Issue: 3, June 2009)