Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

On Decentralized Cloud Storage Security and an Efficient Post-Quantum Encryption Scheme

Kundu, Rohon LU (2024)
Abstract
In this thesis, we address three main security problems related to cryptography and
cloud storage. To tackle the challenge posed by a quantum computer, we need
encryption that is resistant to quantum computers. This category of cryptography
is called post-quantum cryptography. In the first paper, we solve a challenge
in one of the lattice-based cryptographic protocols called Nth-degree Truncated
polynomial Ring Unit (NTRU) namely how to reduce the key size while keeping
the desired security level. We propose a solution that reduces the key size significantly.Our proposed solution allows a practical implementation of NTRU with
fast polynomial multiplications.
Next, we move to solve a long-standing problem... (More)
In this thesis, we address three main security problems related to cryptography and
cloud storage. To tackle the challenge posed by a quantum computer, we need
encryption that is resistant to quantum computers. This category of cryptography
is called post-quantum cryptography. In the first paper, we solve a challenge
in one of the lattice-based cryptographic protocols called Nth-degree Truncated
polynomial Ring Unit (NTRU) namely how to reduce the key size while keeping
the desired security level. We propose a solution that reduces the key size significantly.Our proposed solution allows a practical implementation of NTRU with
fast polynomial multiplications.
Next, we move to solve a long-standing problem arising in any cloud storage
namely the reduction of storage cost of redundant data and maintaining security
and privacy at the same time. Data deduplication is considered to be a tool that
can be used to eliminate redundant data and store only one of its copies. But
data deduplication also means that the file cannot go through client-side encryption
which opens up new possibilities of adversarial threats. In order to tackle this
challenge, we propose a new architecture where we perform client-side deduplication
along with dynamic erasure protection by introducing a third-party assistant.
We also performed an erasure analysis to quantitatively analyze the probability of
loss of a file when a large number of replicas are deleted at random.
Finally, we shift our interest to Decentralized Cloud Storage (DCS). DCS
solutions like Filecoin, Storj, and Arweave are gaining more popularity in the Web 3.0 ecosystem. But they are not without challenges. The robustness of the DCS
protocols remains a challenging ground. Since the file in a DCS protocol is stored
in a decentralized manner among different nodes, a Distributed Denial of Service
(DDoS) attack would render the system vulnerable to data loss. Therefore, it is
important to analyze the robustness of decentralized architecture against DDoS
attacks. In our last paper, we perform a similar erasure analysis to that of the
second paper but in a decentralized setup, where the adversary aims to disrupt
the system by deleting a file from the network. Storj is one of the leading players
in the DCS space. We have created an adversarial model capturing the real Storj
network scenario and simulated our model using real-time data obtained from the
Storj network. We obtain resource budget figures for DDoS on Storj using our
model. Also, we propose a better parametric value for the erasure piece distribution
in Storj which suits well when there is a large portion of so-called unvetted nodes
in the network. (Less)
Please use this url to cite or link to this publication:
author
supervisor
organization
publishing date
type
Thesis
publication status
published
subject
pages
111 pages
publisher
Department of Electrical and Information Technology, Lund University
ISBN
978-91-8104-065-4
978-91-8104-064-7
project
Säkra mjukvaruuppdateringar för den smarta staden
language
English
LU publication?
yes
id
ad6cdd38-0a62-499a-8705-aa11406c941a
date added to LUP
2024-06-02 01:18:50
date last changed
2024-06-03 15:43:09
@misc{ad6cdd38-0a62-499a-8705-aa11406c941a,
  abstract     = {{In this thesis, we address three main security problems related to cryptography and<br/>cloud storage. To tackle the challenge posed by a quantum computer, we need<br/>encryption that is resistant to quantum computers. This category of cryptography<br/>is called post-quantum cryptography. In the first paper, we solve a challenge<br/>in one of the lattice-based cryptographic protocols called Nth-degree Truncated<br/>polynomial Ring Unit (NTRU) namely how to reduce the key size while keeping<br/>the desired security level. We propose a solution that reduces the key size significantly.Our proposed solution allows a practical implementation of NTRU with<br/>fast polynomial multiplications.<br/>Next, we move to solve a long-standing problem arising in any cloud storage<br/>namely the reduction of storage cost of redundant data and maintaining security<br/>and privacy at the same time. Data deduplication is considered to be a tool that<br/>can be used to eliminate redundant data and store only one of its copies. But<br/>data deduplication also means that the file cannot go through client-side encryption<br/>which opens up new possibilities of adversarial threats. In order to tackle this<br/>challenge, we propose a new architecture where we perform client-side deduplication<br/>along with dynamic erasure protection by introducing a third-party assistant.<br/>We also performed an erasure analysis to quantitatively analyze the probability of<br/>loss of a file when a large number of replicas are deleted at random.<br/>Finally, we shift our interest to Decentralized Cloud Storage (DCS). DCS<br/>solutions like Filecoin, Storj, and Arweave are gaining more popularity in the Web 3.0 ecosystem. But they are not without challenges. The robustness of the DCS<br/>protocols remains a challenging ground. Since the file in a DCS protocol is stored<br/>in a decentralized manner among different nodes, a Distributed Denial of Service<br/>(DDoS) attack would render the system vulnerable to data loss. Therefore, it is<br/>important to analyze the robustness of decentralized architecture against DDoS<br/>attacks. In our last paper, we perform a similar erasure analysis to that of the<br/>second paper but in a decentralized setup, where the adversary aims to disrupt<br/>the system by deleting a file from the network. Storj is one of the leading players<br/>in the DCS space. We have created an adversarial model capturing the real Storj<br/>network scenario and simulated our model using real-time data obtained from the<br/>Storj network. We obtain resource budget figures for DDoS on Storj using our<br/>model. Also, we propose a better parametric value for the erasure piece distribution<br/>in Storj which suits well when there is a large portion of so-called unvetted nodes<br/>in the network.}},
  author       = {{Kundu, Rohon}},
  isbn         = {{978-91-8104-065-4}},
  language     = {{eng}},
  month        = {{05}},
  note         = {{Licentiate Thesis}},
  publisher    = {{Department of Electrical and Information Technology, Lund University}},
  title        = {{On Decentralized Cloud Storage Security and an Efficient Post-Quantum Encryption Scheme}},
  url          = {{https://lup.lub.lu.se/search/files/188177492/Final_Version_Lic_Thesis_Rohon_Kundu.pdf}},
  year         = {{2024}},
}