Redundancy and access permissions in decentralized file systems:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
2011
|
Schlagworte: | |
Online-Zugang: | Volltext https://nbn-resolving.org/urn:nbn:de:bvb:91-diss-20110905-1079733-0-6 Inhaltsverzeichnis |
Beschreibung: | 248 S. graph. Darst. |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040796316 | ||
003 | DE-604 | ||
005 | 20180906 | ||
007 | t | ||
008 | 130305s2011 d||| m||| 00||| eng d | ||
035 | |a (OCoLC)835328735 | ||
035 | |a (DE-599)BVBBV040796316 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-473 |a DE-703 |a DE-1051 |a DE-824 |a DE-29 |a DE-12 |a DE-91 |a DE-19 |a DE-1049 |a DE-92 |a DE-739 |a DE-898 |a DE-355 |a DE-706 |a DE-20 |a DE-1102 |a DE-91G | ||
084 | |a DAT 250d |2 stub | ||
084 | |a DAT 410d |2 stub | ||
100 | 1 | |a Amann, Johanna |e Verfasser |4 aut | |
245 | 1 | 0 | |a Redundancy and access permissions in decentralized file systems |c Johanna Amann |
264 | 1 | |c 2011 | |
300 | |a 248 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |a München, Techn. Univ., Diss., 2011 | ||
650 | 0 | 7 | |a Verteiltes Dateiverwaltungssystem |0 (DE-588)4294597-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Redundanz |0 (DE-588)4157937-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Verteiltes Dateiverwaltungssystem |0 (DE-588)4294597-5 |D s |
689 | 0 | 1 | |a Redundanz |0 (DE-588)4157937-9 |D s |
689 | 0 | 2 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o urn:nbn:de:bvb:91-diss-20110905-1079733-0-6 |
856 | 4 | 1 | |u http://mediatum.ub.tum.de/node?id=1079733 |x Verlag |z kostenfrei |3 Volltext |
856 | 4 | |u https://nbn-resolving.org/urn:nbn:de:bvb:91-diss-20110905-1079733-0-6 |x Resolving-System | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025776507&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ebook | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-025776507 |
Datensatz im Suchindex
_version_ | 1804150131959791616 |
---|---|
adam_text | IMAGE 1
CONTENTS
ZUSAMMENFASSUNG 3
ABSTRACT 5
PRE-PUBLICATIONS 7
DANKSAGUNGEN 9
1. INTRODUCTION 1 7
1.1. CONTRIBUTION 19
1.2. ORGANIZATION 19
1. B A C K G R O U N D 2 3
2. CRYPTOGRAPHIC ALGORITHMS 2 5
2.1. HASHING ALGORITHMS 25
2.2. SYMMETRIC ENCRYPTION ALGORITHMS 26
2.3. PUBLIC KEY ALGORITHMS 27
2.4. SIGNATURE ALGORITHMS 28
2.5. ELLIPTIC CURVE CRYPTOGRAPHY 29
2.6. MERKLE HASH TREES 30
2.7. SYMMETRIC SIGNATURES 31
2.8. X.509 CERTIFICATES 31
2.9. GROUP KEY EXCHANGE 32
2.10. SUBSET DIFFERENCE REVOCATION 33
2.11. IDENTITY AND ATTRIBUTE BASED ENCRYPTION 36
3. PEER-TO-PEER NETWORKS 3 9
3.1. HISTORY 40
3.2. CLASSIFICATION OF PEER-TO-PEER SYSTEMS 40
3.3. CENTRALIZED PEER-TO-PEER NETWORKS 41
3.4. PURE PEER-TO-PEER NETWORKS 42
3.4.1. GNUTELLA 42
3.4.2. FREENET 43
3.5. HYBRID PEER-TO-PEER NETWORKS 44
11
HTTP://D-NB.INFO/1032093161
IMAGE 2
3.6. STRUCTURED PEER-TOPEER NETWORKS 45
3.6.1. DISTRIBUTED HASH TABLES 45
3.6.2. CHORD AND CHORD-VARIANTS 46
3.6.3. KADEMLIA 47
3.6.4. CAN 47
3.6.5. DISADVANTAGES OF STRUCTURED PEER-TO-PEER NETWORKS 48
4. FILE SYSTEMS 5 1
4.1. LOCAL FILE SYSTEMS 53
4.1.1. MS-DOS FILE SYSTEM 53
4.1.2. THE UNIX FILE SYSTEM 54
4.2. SINGLE-SERVER BASED DISTRIBUTED FILE SYSTEMS 55
4.2.1. NFS 57
4.2.2. NFSV4 58
4.2.3. ROW-FS 58
4.2.4. CEPHEUS 59
4.2.5. NCRYPTFS 59
4.2.6. TCFS 60
4.2.7. SNAD 61
4.2.8. SUNDR 61
4.2.9. AFS 61
4.2.10. CODA 62
4.2.11. XFS 62
4.3. CLUSTER FILE SYSTEMS 63
4.3.1. GFS 63
4.3.2. HDFS 64
4.3.3. LUSTRE 64
4.3.4. COSTORE 65
4.3.5. GLUSTERFS 65
4.3.6. BITVAULT 66
4.4. DECENTRALIZED DISTRIBUTED FILE SYSTEMS 66
4.4.1. OCEANSTORE 67
4.4.2. CFS 67
4.4.3. IVY 68
4.4.4. TOTAL RECALL 69
4.4.5. KESO 69
4.4.6. PASTIS 70
4.4.7. SIRIUS 71
4.4.8. PLUTUS 72
4.4.9. CELESTE AND PACISSO 73
4.4.10. WUALA 73
4.4.11. TAHOE 74
4.4.12. DRFS 75
4.4.13. FARSITE 75
12
IMAGE 3
4.4.14. CLIQUE 75
4.5. COMPARISON 76
5. IGORFS 7 9
5.1. IGOR 80
5.2. BASIC DESIGN 80
5.3. APPLICATION INTERFACE 83
5.4. FILE STORAGE 83
5.5. DIRECTORIES 85
5.6. BLOCK TRANSFER AND CACHING 85
5.7. FILE SYSTEM UPDATES 85
5.8. COMPARISON 86
II. R E D U N D A N C Y M A I N T E N A N C E 8 9
6. REDUNDANCY CODING S C H E M E S FOR DISTRIBUTED STORAGE 9 1
6.1. EVALUATION SCENARIO 93
6.2. REPLICATION 94
6.3. ERASURE CODING 95
6.3.1. ERASURE CODING IN DISTRIBUTED FILE SYSTEMS 96
6.3.2. COMPARING ERASURE CODING 98
6.4. HYBRID REPLICATION-ERASURE CODING SCHEME 99
6.5. RANDOM LINEAR CODES 101
6.5.1. RLC BLOCK GENERATION 103
6.5.2. COMPARISON 104
6.6. RELATED WORK 106
6.7. CONTRIBUTION AND DIFFERENCES OF THE PRESENTED ALGORITHM I L L
7. REAL-WORLD COMPARISON 115
7.1. TRACE PRESENTATION AND STATIC COMPARISON 115
7.1.1. THE KADEMLIA TRACE 115
7.1.2. THE MICROSOFT TRACE 119
7.1.3. OTHER AVAILABILITY TRACES 120
7.2. DYNAMIC REAL-WORLD COMPARISON 121
7.2.1. GENERAL PROBING PROCESS 121
7.2.2. PROBING REPLICATION 122
7.2.3. PROBING ERASURE CODES 123
7.2.4. PROBING HYBRID CODES 123
7.2.5. PROBING RANDOM LINEAR CODES 125
7.2.6. EVALUATION 125
7.3. FUTURE WORK 131
13
IMAGE 4
III. A C C E S S P E R M I S S I O N S 1 3 3
8. ACCESS PERMISSIONS FOR DISTRIBUTED FILE SYSTEMS 135
8.1. SECURITY ASSUMPTIONS AND GOALS 135
8.2. SUPPORTED PERMISSION SYSTEM 137
8.3. DESIGN OVERVIEW 138
8.4. DATA INTEGRITY 139
8.5. DATA CONFIDENTIALITY 140
8.6. CLIENT KEYS 140
8.7. RELATED WORK 142
9. ENFORCING FILE PERMISSIONS 145
9.1. DATA INTEGRITY 145
9.1.1. SPLITTING THE DIRECTORY-TREE 146
9.1.2. EXAMPLE DIRECTORY STRUCTURE 147
9.1.3. SECURING THE USER- AND GROUP-ROOTS 149
9.1.4. CALCULATING THE HASHES 149
9.1.5. ROLLBACK ATTACKS 151
9.1.6. FORK CONSISTENCY 152
9.1.7. TRACING MALICIOUS USERS 153
9.2. ENFORCING PERMISSIONS CRYPTOGRAPHICALLY 154
9.2.1. ENFORCING PERMISSIONS FOR FILES 155
9.2.2. ENFORCING PERMISSIONS FOR DIRECTORIES 158
9.2.3. FORWARD KEYS 159
9.2.4. FILES STORED IN FOREIGN DIRECTORIES 160
9.2.5. RENAMING FILES AND DIRECTORIES 162
9.2.6. WORLD-WRITABLE DIRECTORIES 163
9.2.7. REFERENCE LOCATIONS 164
10. EVALUATION & EXTENSIONS 1 6 7
10.1. COMMUNICATION OVERHEAD AND CRYPTOGRAPHIC COST 167
10.1.1. THEORETICAL ANALYSIS 167
10.1.2. PRACTICAL MEASUREMENT 170
10.2. DIFFERENCES TO POSIX 172
10.2.1. THE EXECUTE FLAG 172
10.2.2. BLIND WRITES TO FILES 172
10.2.3. BLIND WRITES TO DIRECTORIES 173
10.2.4. OWNER GROUP MEMBERSHIP 174
10.2.5. SETUID, SETGID AND STICKY 175
10.2.6. DELETION OF SUBDIRECTORIES . . 176
10.2.7. ACCESS EXCLUSION OF GROUPS 176
10.2.8. PROCESS GROUP MEMBERSHIPS 177
10.3. EXTENSIONS 177
10.3.1. ACL SUPPORT 177
14
IMAGE 5
10.3.2. ACLS WITHOUT PUBLIC KEY ENCRYPTION 179
10.3.3. ACLS THROUGH IDENTITY AND ATTRIBUTE BASED ENCRYPTION 179 10.3.4.
SIGNATURE SPEED IMPROVEMENTS 180
IV. C O N C L U S I O N 1 8 1
11. CONCLUSION 1 8 3
A P P E N D I X 1 8 9
A. THE SIMULATION ENVIRONMENT 1 8 9
A.L. SYSTEM REQUIREMENTS 189
A.2. USAGE 190
B. IMPLEMENTATION 195
B.L. THE KEY STORE 195
B.2. USER MANAGEMENT OPERATIONS 196
B.2.1. ADDING AND EVICTING USERS 197
B.2.2. ADDING AND REMOVING GROUPS 197
B.2.3. ADDING AND REMOVING GROUP MEMBERS 197
B.3. FILE SYSTEM OPERATIONS 198
C. CRYPTFS 2 0 3
C.L. SYSTEM REQUIREMENTS 203
C.2. OPTIONS 203
C.3. CREATING A NEW ENCRYPTED FILE SYSTEM 205
LIST O F FIGURES 2 0 9
LIST O F TABLES 2 1 1
BIBLIOGRAPHY 2 1 3
CITATION INDEX 2 3 9
INDEX 2 4 5
15
|
any_adam_object | 1 |
author | Amann, Johanna |
author_facet | Amann, Johanna |
author_role | aut |
author_sort | Amann, Johanna |
author_variant | j a ja |
building | Verbundindex |
bvnumber | BV040796316 |
classification_tum | DAT 250d DAT 410d |
collection | ebook |
ctrlnum | (OCoLC)835328735 (DE-599)BVBBV040796316 |
discipline | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01938nam a2200433 c 4500</leader><controlfield tag="001">BV040796316</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180906 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130305s2011 d||| m||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)835328735</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040796316</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 250d</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 410d</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Amann, Johanna</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Redundancy and access permissions in decentralized file systems</subfield><subfield code="c">Johanna Amann</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">248 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">München, Techn. Univ., Diss., 2011</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes Dateiverwaltungssystem</subfield><subfield code="0">(DE-588)4294597-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Redundanz</subfield><subfield code="0">(DE-588)4157937-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Verteiltes Dateiverwaltungssystem</subfield><subfield code="0">(DE-588)4294597-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Redundanz</subfield><subfield code="0">(DE-588)4157937-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">urn:nbn:de:bvb:91-diss-20110905-1079733-0-6</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://mediatum.ub.tum.de/node?id=1079733</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">https://nbn-resolving.org/urn:nbn:de:bvb:91-diss-20110905-1079733-0-6</subfield><subfield code="x">Resolving-System</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025776507&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025776507</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV040796316 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:34:03Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025776507 |
oclc_num | 835328735 |
open_access_boolean | 1 |
owner | DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-12 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-1102 DE-91G DE-BY-TUM |
owner_facet | DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-12 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-1102 DE-91G DE-BY-TUM |
physical | 248 S. graph. Darst. |
psigel | ebook |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
record_format | marc |
spelling | Amann, Johanna Verfasser aut Redundancy and access permissions in decentralized file systems Johanna Amann 2011 248 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier München, Techn. Univ., Diss., 2011 Verteiltes Dateiverwaltungssystem (DE-588)4294597-5 gnd rswk-swf Redundanz (DE-588)4157937-9 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Verteiltes Dateiverwaltungssystem (DE-588)4294597-5 s Redundanz (DE-588)4157937-9 s Zugriffskontrolle (DE-588)4293034-0 s DE-604 Erscheint auch als Online-Ausgabe urn:nbn:de:bvb:91-diss-20110905-1079733-0-6 http://mediatum.ub.tum.de/node?id=1079733 Verlag kostenfrei Volltext https://nbn-resolving.org/urn:nbn:de:bvb:91-diss-20110905-1079733-0-6 Resolving-System DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025776507&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Amann, Johanna Redundancy and access permissions in decentralized file systems Verteiltes Dateiverwaltungssystem (DE-588)4294597-5 gnd Redundanz (DE-588)4157937-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
subject_GND | (DE-588)4294597-5 (DE-588)4157937-9 (DE-588)4293034-0 (DE-588)4113937-9 |
title | Redundancy and access permissions in decentralized file systems |
title_auth | Redundancy and access permissions in decentralized file systems |
title_exact_search | Redundancy and access permissions in decentralized file systems |
title_full | Redundancy and access permissions in decentralized file systems Johanna Amann |
title_fullStr | Redundancy and access permissions in decentralized file systems Johanna Amann |
title_full_unstemmed | Redundancy and access permissions in decentralized file systems Johanna Amann |
title_short | Redundancy and access permissions in decentralized file systems |
title_sort | redundancy and access permissions in decentralized file systems |
topic | Verteiltes Dateiverwaltungssystem (DE-588)4294597-5 gnd Redundanz (DE-588)4157937-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
topic_facet | Verteiltes Dateiverwaltungssystem Redundanz Zugriffskontrolle Hochschulschrift |
url | http://mediatum.ub.tum.de/node?id=1079733 https://nbn-resolving.org/urn:nbn:de:bvb:91-diss-20110905-1079733-0-6 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025776507&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT amannjohanna redundancyandaccesspermissionsindecentralizedfilesystems |