160 likes | 330 Views
A Privacy-Protecting File System on Public Cloud Storage. Zhonghua Sheng Zhiqiang Ma Lin Gu Ang Li Presented By : Milind Dake. Introduction. Cloud Storage Problems with the existing system Proposed solution – BIFS Conclusion.
E N D
A Privacy-Protecting File System on Public Cloud Storage Zhonghua Sheng Zhiqiang Ma Lin GuAng Li Presented By : MilindDake
Introduction • Cloud Storage • Problems with the existing system • Proposed solution – BIFS • Conclusion
Cloud Storage • Cloud storage is a model of networked online storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Reference -http://en.wikipedia.org/wiki/Cloud_storage
Problems • Privacy protection of data that is stored on cloud. Three major reasons are User data are exposed to operators. The storage media can be lost or stolen Legitimate accesses to the physical media
Solution • Encryption of user data. Problems? Compression and de-duplication Overhead on the storage system • Zadok et al. shows that the encryption overhead may reach 22.7%.
Proposed solution and Goals. • BIFS (Bit-Interleaving File System) - It is the first file system that performs aggressive randomized bit-level reordering for privacy protection and achieves the required strength without bit substitution or full encryption. • Data protection is ensured. • Storage system can still perform a certain level of compression as the data is not completely randomized.
Principles of the design • Let the user handle data, and the infrastructure handle bits. • Hide data by re-ordering, not substitution. • Improve strength by distribution, not entropy.
Master blockwhich contains several parameters including the user’s credential. The BIFS daemon uses information in the master block to locate user data and perform file system operations. Chunk store – Third party application Chunk Allocator – Records the allocation information of all chunks
Conclusion BIFS takes a bit inter-leaving approach to providing strong privacy protection. Protection of user data and still allow certain level of compression.