Building and Evaluating a k-Resilient Mobile Distributed File System Resistant to Device Compromise
MetadataShow full item record
Deploying mobile devices to frontline troops presents many potential benefits, e.g.\ situational awareness, enhanced communication capabilities, etc. However, security remains an impediment to realizing such capability. In this research, we develop and evaluate an approach to securing the non-volatile storage of a collection of mobile devices. Our technique relies on well-established cryptographic primitives, combining them in a unique way to meet military mission specific security and resiliency requirements. Specifically, we create MDFS, a distributed mobile file system using erasure coding, Shamir's threshold secret sharing, and the symmetric AES block cipher. The resulting system provides two important properties: (1) data at rest is protected even after total compromise of up to $k$ devices, and (2) data is replicated within an infrastuctureless ad hoc network and, as such, resilient to device outages. We implement MDFS on Android mobile devices and achieve $\simeq$10Mbps throughput in real-world performance experiments, suggesting that MDFS is suitable for a variety of practical workloads.
Proc. MILCOM Conference, Baltimore, MD, November 2011. (IEEE Ellersick Award winner – best unclassified paper)
Showing items related by title, author, creator and subject.
George, Johnu; Chen, Chien-An; Stoleru, Radu; Xie, Geoffrey (2016);The new generations of mobile devices have high processing power and storage, but they lag behind in terms of software systems for big data storage and processing. Hadoop is a scalable platform that provides distributed ...
Chen, Chien-An; Stoleru, Radu; Xie, Geoffrey G. (IEEE, 2017);Today's integration of mobile technologies and traditional cloud computing exploits the abundant computation and storage resources in the cloud, to enhance the capabilities of end-user mobile devices. The designs that rely ...
Metingu, Kivanc (Monterey, California. Naval Postgraduate School, 2004-03);Modern technology is making virtual environments a part of daily life. However, some constraints about the usage of virtual environments, such as the need for high performance and well-configured computers, prevent users ...