TY - GEN
T1 - Performance evaluation of a fragmented secret share system
AU - Ukwandu, Elochukwu
AU - Buchanan, William J.
AU - Russell, Gordon
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/10/19
Y1 - 2017/10/19
N2 - There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed as a keyless and resilient mechanism to mitigate this, but scaling through large scale data infrastructure has remained the bane of using secret sharing scheme in big data storage and retrievals. This work applies secret sharing methods as used in cryptography to create robust and secure data storage and retrievals in conjunction with data fragmentation. It outlines two different methods of distributing data equally to storage locations as well as recovering them in such a manner that ensures consistent data availability irrespective of file size and type. Our experiments consist of two different methods-data and key shares. Using our experimental results, we were able to validate previous works on the effects of threshold on file recovery. Results obtained also revealed the varying effects of share writing to and retrieval from storage locations other than computer memory. The implication is that increase in fragment size at varying file and threshold sizes rather than add overheads to file recovery, do so on creation instead, underscoring the importance of choosing a varying fragment size as file size increases.
AB - There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed as a keyless and resilient mechanism to mitigate this, but scaling through large scale data infrastructure has remained the bane of using secret sharing scheme in big data storage and retrievals. This work applies secret sharing methods as used in cryptography to create robust and secure data storage and retrievals in conjunction with data fragmentation. It outlines two different methods of distributing data equally to storage locations as well as recovering them in such a manner that ensures consistent data availability irrespective of file size and type. Our experiments consist of two different methods-data and key shares. Using our experimental results, we were able to validate previous works on the effects of threshold on file recovery. Results obtained also revealed the varying effects of share writing to and retrieval from storage locations other than computer memory. The implication is that increase in fragment size at varying file and threshold sizes rather than add overheads to file recovery, do so on creation instead, underscoring the importance of choosing a varying fragment size as file size increases.
KW - Data
KW - Disaster contention
KW - Secret shares
KW - Thresholds scheme
KW - key
UR - http://www.scopus.com/inward/record.url?scp=85039958786&partnerID=8YFLogxK
U2 - 10.1109/CyberSA.2017.8073396
DO - 10.1109/CyberSA.2017.8073396
M3 - Conference contribution
AN - SCOPUS:85039958786
T3 - 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, Cyber SA 2017
BT - 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, Cyber SA 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, Cyber SA 2017
Y2 - 19 June 2017 through 20 June 2017
ER -