Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach, 1992. ,
DOI : 10.1007/978-3-642-79789-7_11
Fragmentation of confidential objects for data processing security in distributed systems, Proceedings of the Fifth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, pp.395-403, 1995. ,
Survivable storage systems ,
DOI : 10.1109/discex.2001.932171
, DARPA Information Survivability Conference amp; Exposition II, 2001. DISCEX '01. Proceedings, vol.2, pp.184-195, 2001.
Why your encrypted database is not secure, Proceedings of the 16th Workshop on Hot Topics in Operating Systems, HotOS '17, pp.162-168, 2017. ,
DOI : 10.1145/3102980.3103007
An efficient data protection architecture based on fragmentation and encryption, 2018. ,
, Data confidentiality using
Data protection: Combining fragmentation, encryption, and dispersion, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), pp.1-9, 2015. ,
DOI : 10.1109/ssic.2015.7245680
URL : https://hal.archives-ouvertes.fr/hal-01212158
, National Institute of Standards and Technology, Computer Security Division, Information Technology Laboratory, 2011.
Resilient data aggregation for unattended wsns, 2011 IEEE 36th Conference on Local Computer Networks, pp.994-1002, 2011. ,
DOI : 10.1109/lcn.2011.6114411
Efficient aggregation of encrypted data in wireless sensor networks, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp.109-117, 2005. ,
Catch me (if you can): Data survival in unattended sensor networks, Sixth Annual IEEE International Conference on Pervasive Computing and Communications, pp.185-194, 2008. ,
Data security in unattended wireless sensor networks, IEEE Trans. Comput, vol.58, issue.11, pp.1500-1511, 2009. ,
Epidemic data survivability in unattended wireless sensor networks, Proceedings of the Fourth ACM Conference on Wireless Network Security, WiSec '11, pp.11-22, 2011. ,
A survey of image security in wireless sensor networks, Journal of Imaging, vol.1, issue.1, pp.4-30, 2015. ,
Secure and resilient scheme for data protection in unattended wireless sensor networks, 1st Cyber Security in Networking Conference, pp.1-8, 2017. ,
Secret sharing made short, Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '93, pp.136-146, 1994. ,
Efficient dispersal of information for security, load balancing, and fault tolerance, J. ACM, vol.36, issue.2, pp.335-348, 1989. ,
Data confidentiality and availability via secret sharing and node mobility in uwsn, 2013 Proceedings IEEE INFOCOM, pp.205-209, 2013. ,
A distributed data storage and retrieval scheme in unattended wsns using homomorphic encryption and secret sharing, 2nd IFIP Wireless Days (WD), pp.1-6, 2009. ,
Secure and efficient data storage in unattended wireless sensor networks, 3rd International Conference on New Technologies, Mobility and Security, pp.1-5, 2009. ,
Hybrids: A scheme for secure distributed data storage in wsns, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, vol.2, pp.318-323, 2008. ,
How to share a secret, Commun. ACM, vol.22, issue.11, pp.612-613, 1979. ,
Dependable and secure sensor data storage with dynamic integrity assurance, IEEE INFOCOM 2009, pp.954-962, 2009. ,
, Future directions in computing on encrypted data, 2015.
Depsky: Dependable and secure storage in a cloud-of-clouds, + 13, vol.9, p.33, 2013. ,
Mix&slice: Efficient access revocation in the cloud, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS '16, pp.217-228, 2016. ,
Hail: A highavailability and integrity layer for cloud storage, Proceedings of the 16th ACM conference on Computer and communications security, pp.187-198, 2009. ,
Energy-aware distribution of data fragments in unattended wireless sensor networks, Proceedings of the Third International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC '18, 2018. ,
Multi-hop data fragmentation in unattended wireless sensor networks, Submitted to the International Conference on Information Processing in Sensor Networks (IPSN 2019), 2009. ,
Entropy measures and unconditional security in cryptography, 1997. ,
The ? 2 test of goodness of fit, Ann. Math. Statist, vol.23, issue.3, p.1952 ,
Thirteen Ways to Look at the Correlation Coefficient, The American Statistician, vol.42, issue.1, pp.59-66, 1988. ,
, Multi-hop Data Fragmentation in Unattended Wireless Sensor Networks, the International Conference on Information Processing in Sensor Networks (IPSN), 2019.
POSTER: CAON:A Very Fast Scheme to Protect Encrypted Data against Key Exposure, ACM Conference on Computer and Communications Security (CCS), 2018. ,
, Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure. 10th International Symposium on Cyberspace Safety and Security (CSS), 2018.
DOI : 10.1007/978-3-030-01689-0_15
A Fast and Scalable Fragmentation Algorithm for Data Protection Using Multi-storage over Independent Locations, Security and Trust Management (STM, Esorics' workshop), 2018. ,
Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted Data, 2018. ,
Secure and resilient scheme for data protection in unattended wireless sensor networks, 1st Cyber Security in Networking Conference (CSNet), 2017. ,
POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation, ACM Conference on Computer and Communications Security (CCS), 2016. ,
Data protection by means of fragmentation in distributed storage systems, International Conference on Protocol Engineering and International Conference on New Technologies of Distributed Systems (ICPE/NTDS), 2015. ,
Talks: 1. Accelerating all-or-nothing transforms, Data Protection: Combining Fragmentation, Encryption, and Dispersion, ITEA2-CAP WP3 Final Report, 2016. ,
, Secure Data Fragmentation and Dispersal, 2018.
, A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation, SnT, 2017.
, Poster presentation) Fragmentation for data protection, The International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2016.
, Recherche sur la Protection des Données par Fragmentation, Nathalie ENFRIN, professional thesis, 6 months, 2018.
, Protection des données dans les réseaux de capteurs de type UWSN, 2018.
, Protection des données dans les environnements distribués (Cloud), 2017.
13 (Selective All-or-nothing) Pseudo-code of the linear all-or-nothing transform applied to the share SHARE 11, Protection des données dans les environnements distribués (Cloud), vol.3, p.138 ,
, 14 (Selective All-or-nothing) Dispersing private and public fragments
, 15 (Selective All-or-nothing) Performance results, p.142
PE-AON) Illustration of the partial encryption and fragmentation of a plaintext, vol.153 ,
PE-AON) Fragments after applying the all-or-nothing transform, vol.155 ,
, PE-AON) Performance benchmark, vol.4
, 168 5.2 FSFA -Pseudo-code of the function transforming data into fragments
, FSFA) Pseudo-code of the function EncodeAndPermuteBlock, vol.5
, 5 (FSFA) Performance benchmark
Simplified scheme of the network architecture, p.193 ,
, Storage cost per sensor
, Transmission costs per sensor
Comparison of two aggregation variants, p.205 ,
, , p.206
1 Empirical analysis, byte value distribution, p.222 ,
, Probability density function and entropy comparison for different data samples
57 2.2 A comparison between relevant bitwise fragmentation techniques in terms of volume of stored data, resilience, and data confidentiality ,
, 130 4.1 (PE-AON) Complexity comparison with relevant techniques. . 157 5.1 FSFA: Runtime and storage requirements of relevant fragmentation algorithms, Circular All-or-nothing) Comparison with relevant works
, Quantitative analysis of relevant schemes providing data protection inside UWSN, vol.201, p.235