28 May 2013 Solving data-at-rest for the storage and retrieval of files in ad hoc networks
Author Affiliations +
Abstract
Based on current trends for both military and commercial applications, the use of mobile devices (e.g. smartphones and tablets) is greatly increasing. Several military applications consist of secure peer to peer file sharing without a centralized authority. For these military applications, if one or more of these mobile devices are lost or compromised, sensitive files can be compromised by adversaries, since COTS devices and operating systems are used. Complete system files cannot be stored on a device, since after compromising a device, an adversary can attack the data at rest, and eventually obtain the original file. Also after a device is compromised, the existing peer to peer system devices must still be able to access all system files. McQ has teamed with the Cryptographic Engineering Research Group at George Mason University to develop a custom distributed file sharing system to provide a complete solution to the data at rest problem for resource constrained embedded systems and mobile devices. This innovative approach scales very well to a large number of network devices, without a single point of failure. We have implemented the approach on representative mobile devices as well as developed an extensive system simulator to benchmark expected system performance based on detailed modeling of the network/radio characteristics, CONOPS, and secure distributed file system functionality. The simulator is highly customizable for the purpose of determining expected system performance for other network topologies and CONOPS.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Ron Knobler, Ron Knobler, Peter Scheffel, Peter Scheffel, Jonathan Williams, Jonathan Williams, Kris Gaj, Kris Gaj, Jens-Peter Kaps, Jens-Peter Kaps, "Solving data-at-rest for the storage and retrieval of files in ad hoc networks", Proc. SPIE 8755, Mobile Multimedia/Image Processing, Security, and Applications 2013, 875511 (28 May 2013); doi: 10.1117/12.2015443; https://doi.org/10.1117/12.2015443
PROCEEDINGS
7 PAGES


SHARE
RELATED CONTENT

The multi-queue model applied to random access protocol
Proceedings of SPIE (March 13 2013)
EDOS system life-cycle modeling
Proceedings of SPIE (October 02 1998)
ABB: active bandwidth broker
Proceedings of SPIE (July 23 2001)
A role-based trust model for peer-to-peer systems
Proceedings of SPIE (October 01 2006)
WDM EPON system modeling and simulation based on OPNET
Proceedings of SPIE (September 27 2006)

Back to Top