A Multi-User Steganographic File System on Untrusted Shared Storage

Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such a claim is plausible if the adversary only sees the disk content at the point of attack. In a multi-user computing enviro...

Full description

Saved in:
Bibliographic Details
Main Authors: HAN, Jin, PAN, Meng, GAO, Debin, PANG, Hwee Hwa
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2010
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1310
https://ink.library.smu.edu.sg/context/sis_research/article/2309/viewcontent/A_Multi_User_Steganographic_File_System_on_Untrusted_Shared_Storage__edited_.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2309
record_format dspace
spelling sg-smu-ink.sis_research-23092017-07-11T06:22:23Z A Multi-User Steganographic File System on Untrusted Shared Storage HAN, Jin PAN, Meng GAO, Debin PANG, Hwee Hwa Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such a claim is plausible if the adversary only sees the disk content at the point of attack. In a multi-user computing environment that employs untrusted shared storage, however, the adversary could have taken multiple snapshots of the disk content over time. Since the dummy data are static, the differences across snapshots thus disclose the locations of user data, and could even reveal the user passwords. In this paper, we introduce a Dummy-Relocatable Steganographic (DRSteg) file system to provide deniability in multi-user environments where the adversary may have multiple snapshots of the disk content. With its novel techniques for sharing and relocating dummy data during runtime, DRSteg allows a data owner to surrender only some data and attribute the unexplained changes across snapshots to the dummy operations. The level of deniability offered by DRSteg is configurable by the users, to balance against the resulting performance overhead. Additionally, DRSteg guarantees the integrity of the protected data, except where users voluntarily overwrite data under duress. 2010-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1310 info:doi/10.1145/1920261.1920309 https://ink.library.smu.edu.sg/context/sis_research/article/2309/viewcontent/A_Multi_User_Steganographic_File_System_on_Untrusted_Shared_Storage__edited_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Databases and Information Systems Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Databases and Information Systems
Information Security
spellingShingle Databases and Information Systems
Information Security
HAN, Jin
PAN, Meng
GAO, Debin
PANG, Hwee Hwa
A Multi-User Steganographic File System on Untrusted Shared Storage
description Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such a claim is plausible if the adversary only sees the disk content at the point of attack. In a multi-user computing environment that employs untrusted shared storage, however, the adversary could have taken multiple snapshots of the disk content over time. Since the dummy data are static, the differences across snapshots thus disclose the locations of user data, and could even reveal the user passwords. In this paper, we introduce a Dummy-Relocatable Steganographic (DRSteg) file system to provide deniability in multi-user environments where the adversary may have multiple snapshots of the disk content. With its novel techniques for sharing and relocating dummy data during runtime, DRSteg allows a data owner to surrender only some data and attribute the unexplained changes across snapshots to the dummy operations. The level of deniability offered by DRSteg is configurable by the users, to balance against the resulting performance overhead. Additionally, DRSteg guarantees the integrity of the protected data, except where users voluntarily overwrite data under duress.
format text
author HAN, Jin
PAN, Meng
GAO, Debin
PANG, Hwee Hwa
author_facet HAN, Jin
PAN, Meng
GAO, Debin
PANG, Hwee Hwa
author_sort HAN, Jin
title A Multi-User Steganographic File System on Untrusted Shared Storage
title_short A Multi-User Steganographic File System on Untrusted Shared Storage
title_full A Multi-User Steganographic File System on Untrusted Shared Storage
title_fullStr A Multi-User Steganographic File System on Untrusted Shared Storage
title_full_unstemmed A Multi-User Steganographic File System on Untrusted Shared Storage
title_sort multi-user steganographic file system on untrusted shared storage
publisher Institutional Knowledge at Singapore Management University
publishDate 2010
url https://ink.library.smu.edu.sg/sis_research/1310
https://ink.library.smu.edu.sg/context/sis_research/article/2309/viewcontent/A_Multi_User_Steganographic_File_System_on_Untrusted_Shared_Storage__edited_.pdf
_version_ 1770570945240498176