Confidential Data Dispersion using Thresholding

of a thesis at the University of Miami. Thesis supervised by Dr. Burton Rosenberg. No. of pages in text. (41) With growing trend in “cloud computing” and increase in the data moving into the Internet, the need to store large amounts of data by service providers such as Google, Yahoo and Microsoft has increased over time. Now, more than ever, there is a need to efficiently and securely store large amounts of data. This thesis presents an implementation of a Ramp Scheme that confidentially splits a data file into a configurable number of parts or shares of equal size such that a subset of those shares can recover the data entirely. Furthermore, the implementation supports a threshold for data compromise and data checksum verification to verify that the data parts have not been tampered with. This thesis addresses two key problems faced in large-scale data storage, namely, data availability and confidentiality.

[1]  Tzong-Chen Wu,et al.  Cheating detection and cheater identification in secret sharing schemes , 1995 .

[2]  Laurent Lefèvre,et al.  On Improving the Reliability of Internet Services through Active Replication , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[3]  Amos Beimel,et al.  Secret Sharing With Public Reconstruction , 1998 .

[4]  Alfredo De Santis,et al.  Randomness in Distribution Protocols , 1996, Inf. Comput..

[5]  Barbara Masucci,et al.  A Note on the Randomness in Dynamic Threshold Schemes , 1999, J. Comput. Secur..

[6]  Alfredo De Santis,et al.  Efficient Sharing of Many Secrets , 1993, STACS.

[7]  Douglas R. Stinson,et al.  A Combinatorial Approach to Threshold Schemes , 1987, SIAM J. Discret. Math..

[8]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[9]  Catherine A. Meadows,et al.  Security of Ramp Schemes , 1985, CRYPTO.

[10]  James E. Smith,et al.  Implementing high availability memory with a duplication cache , 2008, 2008 41st IEEE/ACM International Symposium on Microarchitecture.

[11]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).