期刊文献+

ESSA: An Efficient and Secure Splitting Algorithm for Distributed Storage Systems

ESSA: An Efficient and Secure Splitting Algorithm for Distributed Storage Systems
下载PDF
导出
摘要 The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presented,which takes advantage of a two level information dispersal scheme to strengthen the security of data.In ESSA,the approach of knight’s tour problem,which is NP-Complete,is introduced to scramble data at the first level,and a split cube is used to split scrambled data at the second level.Thus,it is very difficult for the malicious user to get information because the task of reconstructing the original data needs more computation than they can tolerate.We prove that the security of ESSA is better than encryption algorithm and not inferior to erasure codes and secret sharing.Experimental results show that distributed storage systems exploiting ESSA has greater efficiency than that exploiting keyed encryption,erasure codes and secret sharing. The security of critical data is an important issue for distributed storage system design, especially for long-term storage. ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presented, which takes advantage of a two level information dispersal scheme to strengthen the security of data. In ESSA, the approach of knight's tour problem, which is NP-Complete, is introduced to scramble data at the first level, and a split cube is used to split scrambled data at the second level. Thus, it is very difficult for the malicious user to get information because the task of reconstructing the original data needs more computation than they can tolerate. We prove that the security of ESSA is better than encryption algorithm and not inferior to erasure codes and secret sharing. Experimental results show that distributed storage systems exploiting ESSA has greater efficiency than that exploiting keyed encryption, erasure codes and secret sharing.
出处 《China Communications》 SCIE CSCD 2010年第4期89-95,共7页 中国通信(英文版)
基金 This study is supported by National Natural Science Foundation of China (No.60973146) National Natur al Science Foundation of Beijing (No.4092029) The Fundamental Research Funds for the Central Universities (No.2009RC0217). We also thank the anonymous reviewers for their constructive comments.
关键词 存储系统 安全性 安全技术 通信技术 Distributed System Secure Storage Information Dispersal knight's tour problem
  • 相关文献

参考文献16

  • 1Yongdae K, Maithili N, Gene T. Secure group key management for storage area networks [J]. IEEE Communications Magazine, 2003, 41(8): 92-96.
  • 2Kubiatowicz J, Bindel D, Chen P Yan, et al, Oceanstore: An architecture for global-scale persistent storage [C]//Proceedings of the ninth intemational conference on Architectural support for programming languages and operating systems. Cambridge, USA: ACM Press, 2000: 190-201.
  • 3Adya A, Bolosky WJ, Castro M, et al. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment [C]// Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI). Boston, USA: ACM Press, 2002: 1-14.
  • 4Rowstron A, Druschel P. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility [C]// Proceedings of the 18th ACM Symposium on Operating Systems Principles. Alberta, Canada: ACM Press, 2001 : 188-201.
  • 5Kotla R, Alvisi L, Dahlin M. SafeStore: a durable and practical storage system [C]//2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference. Berkeley, USA: USENIX Association, 2007: 1-14.
  • 6Chang F, Ji M, Leung St, et al. Myriad: Cost-effective Disaster Tolerance [C]//Proceedings of the 1st USENIX Conference on File and Storage Technologies. Berkeley, USA: USENIX Association, 2002:103-116.
  • 7Rabin MO. Efficient dispersal of information for security, load balancing, and fault tolerance [J]. Journal of the ACM. 1989, 36(2): 335-348.
  • 8Ganger G, Khosla P, Bakkaloglu M, et al. Survivable storage systems [C]//Proceedings of DARPA Information Survivability Conference and Exposition. Anaheim. USA: 1EEE Press, 2001 : 184-195.
  • 9Subbiah A, Blough Dm. An approach for fault tolerant and secure data storage in collaborative work environments [C]//Proceedings of the 2005 ACM Workshop on Storage Security and Survivability. Fairfax, USA: ACM Press, 2005: 84-93.
  • 10Shamir A. How to share a secret [J]. Communications of the ACM. 1979, 22(11): 612-613.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部