Wireless Communications and Applications. First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers

Research Article

A Model of Survivable Storage System Based on Information Hiding

Download
244 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-29157-9_22,
        author={Qingjie Zhang and Jianming Zhu and Yiheng Wang},
        title={A Model of Survivable Storage System Based on Information Hiding},
        proceedings={Wireless Communications and Applications. First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers},
        proceedings_a={ICWCA},
        year={2012},
        month={5},
        keywords={survivable storage system information hiding intrusion diagnosis and recovery discrete cosine transformation},
        doi={10.1007/978-3-642-29157-9_22}
    }
    
  • Qingjie Zhang
    Jianming Zhu
    Yiheng Wang
    Year: 2012
    A Model of Survivable Storage System Based on Information Hiding
    ICWCA
    Springer
    DOI: 10.1007/978-3-642-29157-9_22
Qingjie Zhang1,*, Jianming Zhu1,*, Yiheng Wang1,*
  • 1: Central University of Finance and Economics
*Contact email: cufe_dbzy@163.com, tyzjm65@163.com, wangyiheng722@163.com

Abstract

A new model of survivable storage system based on the information hiding, which is called SSSBIH, is presented in this paper, This SSSBIH model is derived from the PASIS model. SSSBIH model can make stored data more security than PASIS model. We design the information hiding function in client agent and describe its principle of work in this paper. Note that data tampering from internal intruders is difficult to be detected nowadays. The information hiding function can detect tampering whatever any user accesses the data. With threshold themes, our model can carry out effective recovery for tampered data. Our model also doesn’t need the history pool of the old data versions. This can save the storage space of storage nodes. At last, we give out an information hiding algorithm based on the discrete cosine transformation and make a simulation. In short, our model can enhance data credibility, survivability and security of a storage system.