[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shekhanin et al., 2018 - Google Patents

Steganographic hiding information in a file system structure

Shekhanin et al., 2018

Document ID
12834848798864403485
Author
Shekhanin K
Kolhatin A
Kuznetsova K
Kavun S
Publication year
Publication venue
2018 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo)

External Links

Snippet

In this paper, the methods of steganography hiding of information in a file system structure is investigated. Namely, the structure of the FAT file system (File Allocation Table) and methods of hiding information messages, which are based on repositioning separate …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/3015Redundancy elimination performed by the file system
    • G06F17/30156De-duplication implemented within the file system, e.g. based on file segments
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
    • G06F3/0601Dedicated interfaces to storage systems
    • G06F3/0628Dedicated interfaces to storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/064Management of blocks
    • G06F3/0641De-duplication techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30091File storage and access structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
    • G06F3/0601Dedicated interfaces to storage systems
    • G06F3/0602Dedicated interfaces to storage systems specifically adapted to achieve a particular effect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
    • G06F3/0601Dedicated interfaces to storage systems
    • G06F3/0668Dedicated interfaces to storage systems adopting a particular infrastructure
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security

Similar Documents

Publication Publication Date Title
FI121487B (en) An encryption method that utilizes data dissemination
US8892907B2 (en) Storage and recovery of cryptographic key identifiers
US10264072B2 (en) Systems and methods for processing-based file distribution in an aggregation of cloud storage services
Naveed et al. Dynamic searchable encryption via blind storage
US20190306240A1 (en) Systems and methods for third-party policy-based file distribution in an aggregation of cloud storage services
Storer et al. Secure data deduplication
US10356158B2 (en) Systems and methods for aggregation of cloud storage
US7949693B1 (en) Log-structured host data storage
US20170329677A1 (en) Systems and methods for secure file management via an aggregation of cloud storage services
CN108200172B (en) Cloud storage system and method supporting safe data deduplication and deletion
WO2012063755A1 (en) Distributed archive system, data archive device, and data restoring device
Roche et al. Deterministic, stash-free write-only oram
Venčkauskas et al. Covert channel for cluster-based file systems using multiple cover files
Oprea et al. Integrity Checking in Cryptographic File Systems with Constant Trusted Storage.
CN105718808A (en) File encryption storage system and method based on multiple network disks
US8751831B1 (en) Achieving strong cryptographic correlation between higher level semantic units and lower level components in a secure data storage system
US20060089936A1 (en) System and method for a secure, scalable wide area file system
Kim et al. Survey on Data Deduplication in Cloud Storage Environments.
Shekhanin et al. Steganographic hiding information in a file system structure
Williams et al. Access privacy and correctness on untrusted storage
Srinivasan et al. HIDEINSIDE—A novel randomized & encrypted antiforensic information hiding
KR20230104877A (en) How to ensure confidentiality and integrity of data and metadata stored in untrusted environments
Heckel Minimizing remote storage usage and synchronization time using deduplication and multichunking: Syncany as an example
Sheng et al. A privacy-protecting file system on public cloud storage
US20130218851A1 (en) Storage system, data management device, method and program