Abstract

In just a few years, ransomware evolved into one of the most pernicious threats on the web. From hijacking private disks, the cybercriminals moved to disabling hospital networks, while the cyberwarriors launched destructive cyberwar exercises masquerading as ransomware. To match the variety of attacks, there is also a variety of promising proposals for the mitigation of the ransomware problem by disrupting the attack cycle at various points. None of them seems to be eliminating the vulnerability of static nodes in dynamic networks. We put forward the idea that ransomware is a symptom of a broader problem of architectural imbalance in social computation, while the processes are dynamic and nonlocal, the storage is static and local. We study and discuss some paths toward dynamic, nonlocal, and secure storage. Furthermore, we provide a toy method for locally encrypting the data that can provide a balance of high security and encryption speed.

Highlights

  • WHY IS THERE RANSOMWARE?I N THE recent years, ransomware has emerged as a significant threat across all levels of use, from individuals, hospitals, and banks, to government institutions and organizations [1]–[4]

  • We address encryption which will take into account considerations that arise from requiring frequent backups of a large amount of data

  • Their codes are applied to the use case of a Hadoop HDFS, and they claim a reduction in repair disk I/O and network traffic associated with the repairs

Read more

Summary

INTRODUCTION

I N THE recent years, ransomware has emerged as a significant threat across all levels of use, from individuals, hospitals, and banks, to government institutions and organizations [1]–[4]. The passive storage architecture enables malicious executables to hijack the locally stored data. Ransomware enabled criminals to profit from hacking into systems where the data could not be sold to other criminals. The United States of America and the Union of Soviet Socialist Republics were in an arms race They were designing nuclear command and control systems to insure if one side launched nuclear ballistic missiles the other would respond in kind. The Internet was born of social and political challenges It answered the requirement of a robust communications infrastructure that could survive an all-out nuclear war. Resolving problem (1) by assuring the confidentiality of nonlocal (cloud) storage is an interesting challenge which requires reconciling technical investments into the solution and the rational confidentiality requirements

WHAT IS RANSOMWARE?
RANSOMWARE DEFENSE STRATEGY
DYNAMIC DISTRIBUTED SECURE STORAGE
Fast and Secure Local Encryption
One-Time Pad and Latin Squares
One-Time Pad and Deletion-Based Cryptosystem
RELATED WORK
Findings
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.