Cryptographic defense against traffic analysis
STOC '93 Proceedings of the twenty-fifth annual ACM symposium on Theory of computing
Software protection and simulation on oblivious RAMs
Journal of the ACM (JACM)
Private information storage (extended abstract)
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Journal of the ACM (JACM)
Traffic analysis: protocols, attacks, design issues, and open problems
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
OceanStore: an architecture for global-scale persistent storage
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Mix-Networks on Permutation Networks
ASIACRYPT '99 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Masking page reference patterns in encryption databases on untrusted storage
Data & Knowledge Engineering - Special issue: ER 2004
A Framework for the Analysis of Mix-Based Steganographic File Systems
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Traffic analysis attacks on a continuously-observablesteganographic file system
IH'07 Proceedings of the 9th international conference on Information hiding
Deniable cloud storage: sharing files via public-key deniability
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
A multi-user steganographic file system on untrusted shared storage
Proceedings of the 26th Annual Computer Security Applications Conference
A light-weight solution to preservation of access pattern privacy in un-trusted clouds
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Hi-index | 0.00 |
To support ubiquitous computing, the underlying datahave to be persistent and available anywhere-anytime. Thedata thus have to migrate from devices local to individualcomputers, to shared storage volumes that are accessibleover open network. This potentially exposes the datato heightened security risks. We propose two mechanisms,in the context of a steganographic file system, to mitigatethe risk of attacks initiated through analyzing data accessesfrom user applications. The first mechanism is intended tocounter attempts to locate data through updates in betweensnapshots - in short, update analysis. The second mechanismprevents traffic analysis - identifying data from I/Otraffic patterns. We have implemented the first mechanismon Linux and conducted experiments to demonstrate its effectivenessand practicality. Simulation results on the secondmechanism also show its potential for real world applications.