overwrite a user’s block.
An attacker traces the publisher of a file. In this
attack we assume that the attacker could overcome the
attacks listed above. That assumption needs a consid-
erable processing power, and only major government
agencies can carry out such an attack. Since there is
not an authentication mechanism in the system, the
agency has not any knowledge of the original author
of the file. In this sense the agency has to supplant
the node that store the initial iNode and wait for the
publisher to download the file to catch him. Even in
this case, the network can use one of the mechanisms
described in (Freedman and Morris, 2002) or (TOR, )
to warrant access anonymity to its users.
A government agency prosecutes nodes that dis-
tribute a file. As stated in the previous attacks, nodes
in SCFS do not know which kind of content they
store, their contents or filename. In many countries,
denying knowledge of the content that a node store is
enough to prevent prosecution from local authorities
to node administrators.
5 CONCLUSIONS
In this paper we analyse several distributed filesys-
tems from the point of view of security and conclude
that, as far as we know, there is not a satisfying so-
lution to store personal data. We analyse the security
requirements of such service and conclude that CFS is
the network that best matches the necessities of per-
sonal users. Then, we present a Secure Cooperative
Filesystem that solves the security problems of CFS.
The ideas behind SCFS were implemented in (del
Campo et al., 2008a).
As a result of a security analysis, we conclude
that SCFS solves many of the security requirements
of a distributed file system, but it has several possi-
ble enhancements. Particularly, further research must
be done in order to include an economic system for
SCFS.
ACKNOWLEDGEMENTS
This project was partially supported by a grant of the
Spanish MCT, under the program Consolider-Ingenio
2010 CSD 2007-0004, under the ARES project.
REFERENCES
Tor anonymity online. Webpage: http://www.torproject.org.
(2000). Mnet-mojo nation. Web page: mnetproject.org.
Annapureddy, S., Freedman, M. J., and Mazi
`
eres, D.
(2005). Shark: Scaling file servers via cooperative
caching. NSDI.
Clarke, I., Sandberg, O., Wiley, B., and Hong, T. W.
(2000). Freenet: A distributed anonymous informa-
tion storage and retrieval system. In Designing Pri-
vacy Enhancing Technologies: International Work-
shop on Design Issues in Anonymity and Unobserv-
ability, volume 2009/2001 of Lecture Notes in Com-
puter Science, page 46. Springer Berlin / Heidelberg.
Dabek, F., Kaashoek, M. F., Karger, D., Morris, R., and
Stoica, I. (2001). Wide-area cooperative storage with
cfs. In SOSP ’01: Proceedings of the eighteenth ACM
symposium on Operating systems principles, pages
202–215, New York, NY, USA. ACM Press.
del Campo, J. V., Hern
´
andez-Serrano, J., and Pegueroles, J.
(2008a). Scfs: lewis.upc.es/svn/dfs.
del Campo, J. V., Hern
´
andez-Serrano, J., and Pegueroles,
J. (2008b). Securing cooperative file system. In ES-
ORICS (sent).
Dingledine, R., Freedman, M. J., and Molnar, D. (2001).
The free haven project: Distributed anonymous stor-
age service. Designing Privacy Enhancing Technolo-
gies: International Workshop on Design Issues in
Anonymity and Unobservability, Berkeley, CA, USA,
July 2000, Proceedings:, 2009/2001:67.
Freedman, M. J. and Morris, R. (2002). Tarzan: A peer-to-
peer anonymizing network layer. In CCS.
Grothoff, C., Grothoff, K., Horozov, T., and Lindgren, J. T.
(2006). An encoding for censorship-resistant sharing.
http://gnunet.org/.
Hasan, R., Anwar, Z., Yurcik, W., Brumbaugh, L., and
Campbell, R. (2005). A survey of peer-to-peer stor-
age techniques for distributed file systems. In IEEE
International Conference on Information Technology
(ITCC). Las Vegas.
Maymounkov, P. and Mazi
`
eres, D. (2002). Kademlia:
a peer-to-peer information system based on the xor
metrid. In IPTPS, pages 53–65.
Rabin, M. O. (1989). Efficient dispersal of information for
security, load balancing and fault tolerance. Journal
of the ACM, 36(2):335 – 348.
Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., and Bal-
akrishnan, H. (2001). Chord: A scalable peer-to-peer
lookup service for internet applications. In Proceed-
ings of the 2001 conference on Applications, technolo-
gies, architectures, and protocols for computer com-
munications, pages 149 – 160. ACM Press.
Tatara, K., Hori, Y., and Sakurai, K. (2005). Query for-
warding algorithm supporting initiator anonymity in
gnunet. Proceedings. 11th International Conference
on Parallel and Distributed Systems, Vol. 2:235 – 9.
SECRYPT 2008 - International Conference on Security and Cryptography
176