A Key Generation Scheme of Self-Encryption based Mobile Distributed Storage System

Yoshihiro Kawahara, Hiroki Endo, Tohru Asami

2007

Abstract

Mobile phones are frequently lost or stolen. Latest mobile handsets contain important information such as an address book, short mail messages, and e-cash. To prevent a stranger from accessing to such private information, practical security mechanisms have to be introduced into mobile handsets. We have developed a distributed network storage system that protects private data files stored on the mobile handsets without demanding complex operations for users. As computation resource on the mobile handsets is limited, a lighter encryption scheme is indispensable. In this paper, we report a self-encryption scheme for mobile distributed storage system. Different from existing encryption schemes such as PKI (Public Key Infrastructure), this scheme exploits a diversity of data files for generating unique encryption keys while minimizing computation overhead of encryption. Experimental results show that our scheme can generate completely random keys from zipped text files with light operations.

References

  1. Tokyo Metropolitan Police Department: Annual report on lost and found service in 2006 (2007)
  2. Remote Data Deletion Service, KDDI, http://www.kddi.com/business/pr/security/ address/index.html
  3. Omakase Lock Service, NTT DoCoMo http://www.nttdocomo.co.jp/service/anshin/lock
  4. Sobti, S., Garg, N., Zheng, F., Lai, J., Shao, Y., Zhang, C., Ziskind, E., Krishnamurthy, A. and Wang, R.,: Segank: A Distributed Mobile Storage System, In Proceedings of 3rd Conference on File and Storage Technologies (FAST), (2004)
  5. Kistler, J. J., and Satyanarayanan, M.: Disconnected operation in the Coda file system, In proceeding of the thirteenth ACM symposium on Operating systems principles, pp. 213- 225. (1991)
  6. Adi Shamir: How to share a secret, In Communications of the ACM 22, 1979, S. 612-613 (1979)
  7. Dahlman, E.B. and Yu-Chuen Jou, Further evolution of 3G radio access, Communications Magazine, IEEE, Vol. 44, Issue 3, March 2006, pp. 34 - 35 (2006)
  8. Data Encryption Standard, Federal Information Processing Standard (FIPS) Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington D.C. (1977)
  9. Advanced Encryption Standard (AES), Federal Information Processing Standard (FIPS) Publication 197, National Bureau of Standards, U.S. Department of Commerce, Washington D.C. (2001)
  10. Matt J. B. Robshaw, Stream Ciphers Technical Report TR-701, version 2.0, RSA Laboratories, (1995)
  11. Specifications for a Secure Hash Standard (SHS), Federal Information Processing Standards Publication DRAFT (1992)
  12. Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography, Draft ANSI X9F1, (1999)
  13. NIST, Special Publication 800-22, A statistical test suite for random and pseudorandom number generators for cryptographic applications, (2001)
  14. Aozora Bunko, http://www.aozora.gr.jp/
  15. M. Matsumoto and T. Nishimura, Mersenne twister: A 623-dimensionally equidistributed uniform pseudorandom number generator, ACM Transaction on Modeling and Computer Simulations, (1998)
Download


Paper Citation


in Harvard Style

Kawahara Y., Endo H. and Asami T. (2007). A Key Generation Scheme of Self-Encryption based Mobile Distributed Storage System . In Proceedings of the 1st International Joint Workshop on Wireless Ubiquitous Computing - Volume 1: WUC, (ICEIS 2007) ISBN 978-972-8865-94-8, pages 3-12. DOI: 10.5220/0002425200030012


in Bibtex Style

@conference{wuc07,
author={Yoshihiro Kawahara and Hiroki Endo and Tohru Asami},
title={A Key Generation Scheme of Self-Encryption based Mobile Distributed Storage System},
booktitle={Proceedings of the 1st International Joint Workshop on Wireless Ubiquitous Computing - Volume 1: WUC, (ICEIS 2007)},
year={2007},
pages={3-12},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002425200030012},
isbn={978-972-8865-94-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Joint Workshop on Wireless Ubiquitous Computing - Volume 1: WUC, (ICEIS 2007)
TI - A Key Generation Scheme of Self-Encryption based Mobile Distributed Storage System
SN - 978-972-8865-94-8
AU - Kawahara Y.
AU - Endo H.
AU - Asami T.
PY - 2007
SP - 3
EP - 12
DO - 10.5220/0002425200030012