TY - GEN
T1 - A proposal of a secure P2P-type storage scheme by using the secret sharing and the blockchain
AU - Fukumitsu, Masayuki
AU - Hasegawa, Shingo
AU - Iwazaki, Junya
AU - Sakai, Masao
AU - Takahashi, Daiki
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/5/5
Y1 - 2017/5/5
N2 - We propose a new secure online storage scheme based on an open P2P network without a central server. In the proposed scheme, attackers cannot detect target user data in the online storage because the user data is divided into some parts by the secret sharing, and they are distributed to P2P nodes via the anonymous communication. The proposed scheme can prevent the direct attack on the target user node because metadata for the reconstruction also hidden in the online storage, hence nothing remains in the user node. Even if the state of the P2P network varies over time between the storing and restoring operation, the proposed scheme ensures that the user can identify the target nodes which stored his metadata by utilizing the Blockchain technology with only memorable secure information for user authentication. Furthermore, a malicious node to attack on others can be detected and ruled out by the mutual monitoring among the nodes and the majority decision rule.
AB - We propose a new secure online storage scheme based on an open P2P network without a central server. In the proposed scheme, attackers cannot detect target user data in the online storage because the user data is divided into some parts by the secret sharing, and they are distributed to P2P nodes via the anonymous communication. The proposed scheme can prevent the direct attack on the target user node because metadata for the reconstruction also hidden in the online storage, hence nothing remains in the user node. Even if the state of the P2P network varies over time between the storing and restoring operation, the proposed scheme ensures that the user can identify the target nodes which stored his metadata by utilizing the Blockchain technology with only memorable secure information for user authentication. Furthermore, a malicious node to attack on others can be detected and ruled out by the mutual monitoring among the nodes and the majority decision rule.
KW - Anonymous Communication
KW - Blockchain
KW - Peer-to-Peer (P2P)
KW - Secret Sharing
UR - http://www.scopus.com/inward/record.url?scp=85019661940&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85019661940&partnerID=8YFLogxK
U2 - 10.1109/AINA.2017.11
DO - 10.1109/AINA.2017.11
M3 - Conference contribution
AN - SCOPUS:85019661940
T3 - Proceedings - International Conference on Advanced Information Networking and Applications, AINA
SP - 803
EP - 810
BT - Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017
A2 - Enokido, Tomoya
A2 - Hsu, Hui-Huang
A2 - Lin, Chi-Yi
A2 - Takizawa, Makoto
A2 - Barolli, Leonard
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017
Y2 - 27 March 2017 through 29 March 2017
ER -