1 / 16

A Privacy-Protecting File System on Public Cloud Storage

A Privacy-Protecting File System on Public Cloud Storage. Zhonghua Sheng Zhiqiang Ma Lin Gu Ang Li Presented By : Milind Dake. Introduction. Cloud Storage Problems with the existing system Proposed solution – BIFS Conclusion.

landry
Download Presentation

A Privacy-Protecting File System on Public Cloud Storage

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Privacy-Protecting File System on Public Cloud Storage Zhonghua Sheng Zhiqiang Ma Lin GuAng Li Presented By : MilindDake

  2. Introduction • Cloud Storage • Problems with the existing system • Proposed solution – BIFS • Conclusion

  3. Cloud Storage • Cloud storage is a model of networked online storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Reference -http://en.wikipedia.org/wiki/Cloud_storage

  4. Problems • Privacy protection of data that is stored on cloud. Three major reasons are User data are exposed to operators. The storage media can be lost or stolen Legitimate accesses to the physical media

  5. Solution • Encryption of user data. Problems? Compression and de-duplication Overhead on the storage system • Zadok et al. shows that the encryption overhead may reach 22.7%.

  6. Proposed solution and Goals. • BIFS (Bit-Interleaving File System) - It is the first file system that performs aggressive randomized bit-level reordering for privacy protection and achieves the required strength without bit substitution or full encryption. • Data protection is ensured. • Storage system can still perform a certain level of compression as the data is not completely randomized.

  7. Approach

  8. Principles of the design • Let the user handle data, and the infrastructure handle bits. • Hide data by re-ordering, not substitution. • Improve strength by distribution, not entropy.

  9. Design for BIFS

  10. Master blockwhich contains several parameters including the user’s credential. The BIFS daemon uses information in the master block to locate user data and perform file system operations. Chunk store – Third party application Chunk Allocator – Records the allocation information of all chunks

  11. An example of the bit-interleaving process

  12. Data organization in the BIFS file system

  13. Structure of a Chunk

  14. Bonnie++ Results

  15. Conclusion BIFS takes a bit inter-leaving approach to providing strong privacy protection. Protection of user data and still allow certain level of compression.

More Related