This paper describes a novel shared file system, whose main features are enhanced security and its concurrency control mechanism. The system is especially suitable for access from mobile hosts. Users can edit their shared files concurrently. Shared files are encrypted and decrypted only by clients, and the file server cannot know the contents. The server asynchronously receives the edited parts, which are already encrypted, and merges them into the current version, deciphering neither the stored file nor the encrypted editing data. We call the mechanism 'privacy enhanced merging'. The mechanism and the underlying encryption algorithm, shared file data structure and procedures followed by clients and the server are shown.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Atsushi SHIMBO, Toshinari TAKAHASHI, Masao MUROTA, "Security Mechanism of Privacy Enhanced Shared File System Suitable for Mobile Access" in IEICE TRANSACTIONS on Fundamentals,
vol. E79-A, no. 1, pp. 102-109, January 1996, doi: .
Abstract: This paper describes a novel shared file system, whose main features are enhanced security and its concurrency control mechanism. The system is especially suitable for access from mobile hosts. Users can edit their shared files concurrently. Shared files are encrypted and decrypted only by clients, and the file server cannot know the contents. The server asynchronously receives the edited parts, which are already encrypted, and merges them into the current version, deciphering neither the stored file nor the encrypted editing data. We call the mechanism 'privacy enhanced merging'. The mechanism and the underlying encryption algorithm, shared file data structure and procedures followed by clients and the server are shown.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e79-a_1_102/_p
Copy
@ARTICLE{e79-a_1_102,
author={Atsushi SHIMBO, Toshinari TAKAHASHI, Masao MUROTA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Security Mechanism of Privacy Enhanced Shared File System Suitable for Mobile Access},
year={1996},
volume={E79-A},
number={1},
pages={102-109},
abstract={This paper describes a novel shared file system, whose main features are enhanced security and its concurrency control mechanism. The system is especially suitable for access from mobile hosts. Users can edit their shared files concurrently. Shared files are encrypted and decrypted only by clients, and the file server cannot know the contents. The server asynchronously receives the edited parts, which are already encrypted, and merges them into the current version, deciphering neither the stored file nor the encrypted editing data. We call the mechanism 'privacy enhanced merging'. The mechanism and the underlying encryption algorithm, shared file data structure and procedures followed by clients and the server are shown.},
keywords={},
doi={},
ISSN={},
month={January},}
Copy
TY - JOUR
TI - Security Mechanism of Privacy Enhanced Shared File System Suitable for Mobile Access
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 102
EP - 109
AU - Atsushi SHIMBO
AU - Toshinari TAKAHASHI
AU - Masao MUROTA
PY - 1996
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E79-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 1996
AB - This paper describes a novel shared file system, whose main features are enhanced security and its concurrency control mechanism. The system is especially suitable for access from mobile hosts. Users can edit their shared files concurrently. Shared files are encrypted and decrypted only by clients, and the file server cannot know the contents. The server asynchronously receives the edited parts, which are already encrypted, and merges them into the current version, deciphering neither the stored file nor the encrypted editing data. We call the mechanism 'privacy enhanced merging'. The mechanism and the underlying encryption algorithm, shared file data structure and procedures followed by clients and the server are shown.
ER -