Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Emerge: Self-emerging Data Release using Cloud Data Storage

Li, Chao and Palanisamy, Balaji (2017) Emerge: Self-emerging Data Release using Cloud Data Storage. In: 10th IEEE International Conference on Cloud Computing (Cloud 2017), 25 June 2017 - 30 June 2017, Honolulu, Hawaii, USA.

Available under License : See the attached licence file.

Download (1MB) | Preview
[img] Plain Text (licence)
Available under License : See the attached licence file.

Download (1kB)


In the age of Big Data, advances in distributed technologies and cloud storage services provide highly efficient and cost-effective solutions to large scale data storage and management. Supporting self-emerging data using clouds is a challenging problem. While straight-forward centralized approaches provide a basic solution to the problem, unfortunately they are limited to a single point of trust. Supporting attack-resilient timed release of encrypted data stored in clouds requires new mechanisms for self emergence of data encryption keys that enables encrypted data to become accessible at a future point in time. Prior to the release time, the encryption key remains undiscovered and unavailable in a secure distributed system, making the private data unavailable. In this paper, we propose Emerge, a self-emerging timed data release protocol for securely hiding data encryption keys of private encrypted data in a large-scale Distributed Hash Table (DHT) network that makes the data available and accessible only at the defined release time. We develop a suite of erasure-coding-based routing path construction schemes for securely storing and routing encryption keys in DHT networks that protect an adversary from inferring the encryption key prior to the release time (release-ahead attack) or from destroying the key altogether (drop attack). Through extensive experimental evaluation, we demonstrate that the proposed schemes are resilient to both release-ahead attack and drop attack as well as to attacks that arise due to traditional churn issues in DHT networks.


Social Networking:
Share |


Item Type: Conference or Workshop Item (Paper)
Status: Published
CreatorsEmailPitt UsernameORCID
Li, Chaochl205@pitt.eduCHL205
Palanisamy, Balaji
Date: 2017
Date Type: Publication
Event Title: 10th IEEE International Conference on Cloud Computing (Cloud 2017)
Event Dates: 25 June 2017 - 30 June 2017
Event Type: Conference
Schools and Programs: School of Information Sciences > Information Science
Refereed: Yes
Date Deposited: 14 Jul 2017 16:29
Last Modified: 25 Aug 2017 04:55


Monthly Views for the past 3 years

Plum Analytics

Actions (login required)

View Item View Item