Shekhanin et al., 2018 - Google Patents
Steganographic hiding information in a file system structureShekhanin et al., 2018
- Document ID
- 12834848798864403485
- Author
- Shekhanin K
- Kolhatin A
- Kuznetsova K
- Kavun S
- Publication year
- Publication venue
- 2018 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo)
External Links
Snippet
In this paper, the methods of steganography hiding of information in a file system structure is investigated. Namely, the structure of the FAT file system (File Allocation Table) and methods of hiding information messages, which are based on repositioning separate …
- 238000005516 engineering process 0 description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/3015—Redundancy elimination performed by the file system
- G06F17/30156—De-duplication implemented within the file system, e.g. based on file segments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
- G06F3/0601—Dedicated interfaces to storage systems
- G06F3/0628—Dedicated interfaces to storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/064—Management of blocks
- G06F3/0641—De-duplication techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30091—File storage and access structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
- G06F3/0601—Dedicated interfaces to storage systems
- G06F3/0602—Dedicated interfaces to storage systems specifically adapted to achieve a particular effect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
- G06F3/0601—Dedicated interfaces to storage systems
- G06F3/0668—Dedicated interfaces to storage systems adopting a particular infrastructure
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
FI121487B (en) | An encryption method that utilizes data dissemination | |
US8892907B2 (en) | Storage and recovery of cryptographic key identifiers | |
US10264072B2 (en) | Systems and methods for processing-based file distribution in an aggregation of cloud storage services | |
Naveed et al. | Dynamic searchable encryption via blind storage | |
US20190306240A1 (en) | Systems and methods for third-party policy-based file distribution in an aggregation of cloud storage services | |
Storer et al. | Secure data deduplication | |
US10356158B2 (en) | Systems and methods for aggregation of cloud storage | |
US7949693B1 (en) | Log-structured host data storage | |
US20170329677A1 (en) | Systems and methods for secure file management via an aggregation of cloud storage services | |
CN108200172B (en) | Cloud storage system and method supporting safe data deduplication and deletion | |
WO2012063755A1 (en) | Distributed archive system, data archive device, and data restoring device | |
Roche et al. | Deterministic, stash-free write-only oram | |
Venčkauskas et al. | Covert channel for cluster-based file systems using multiple cover files | |
Oprea et al. | Integrity Checking in Cryptographic File Systems with Constant Trusted Storage. | |
CN105718808A (en) | File encryption storage system and method based on multiple network disks | |
US8751831B1 (en) | Achieving strong cryptographic correlation between higher level semantic units and lower level components in a secure data storage system | |
US20060089936A1 (en) | System and method for a secure, scalable wide area file system | |
Kim et al. | Survey on Data Deduplication in Cloud Storage Environments. | |
Shekhanin et al. | Steganographic hiding information in a file system structure | |
Williams et al. | Access privacy and correctness on untrusted storage | |
Srinivasan et al. | HIDEINSIDE—A novel randomized & encrypted antiforensic information hiding | |
KR20230104877A (en) | How to ensure confidentiality and integrity of data and metadata stored in untrusted environments | |
Heckel | Minimizing remote storage usage and synchronization time using deduplication and multichunking: Syncany as an example | |
Sheng et al. | A privacy-protecting file system on public cloud storage | |
US20130218851A1 (en) | Storage system, data management device, method and program |