A fast and resource efficient FPGA implementation of secret sharing for storage applications

Outsourcing data into the cloud gives wide benefits and opportunities to customers. Beside these advantages, new challenges such as confidentiality and accessibility have to be addressed. One approach to overcome these challenges is by applying secret sharing in a distributed storage setting, known as cloud of clouds approach. For this purpose we present a new hardware architecture of a wide parametrizable secret sharing core. Performance metrics for various applied bit-widths of secret words are given, which are crucial for benefits of higher level protocols in the cloud of clouds approach. Additionally, a complete system which is able to operate in a network environment is presented. The achieved throughputs are in the order of Gbit/s. It is significantly faster than similar comparable hardware architectures and orders of magnitude higher than software implementations.

[1]  Hugo Krawczyk,et al.  Secret Sharing Made Short , 1994, CRYPTO.

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  Mark G. Karpovsky,et al.  Hardware Implementation of Secure Shamir's Secret Sharing Scheme , 2014, 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering.

[4]  Hai Jiang,et al.  Deploying Scalable and Secure Secret Sharing with GPU Many-Core Architecture , 2012, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum.

[5]  Anatolij A. Karatsuba,et al.  Multiplication of Multidigit Numbers on Automata , 1963 .

[6]  Denise Demirel,et al.  Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).

[7]  Stephan Krenn,et al.  Batch-verifiable Secret Sharing with Unconditional Privacy , 2017, ICISSP.

[8]  Héctor M. Pérez Meana,et al.  A GPU implementation of secret sharing scheme based on cellular automata , 2016, The Journal of Supercomputing.

[9]  Daniel Slamanig,et al.  ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).

[10]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[11]  Chik How Tan,et al.  Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings , 2008, 2008 International Conference on Reconfigurable Computing and FPGAs.

[12]  John Kubiatowicz,et al.  Erasure Coding Vs. Replication: A Quantitative Comparison , 2002, IPTPS.

[13]  Johannes Wolkerstorfer,et al.  Secret-Sharing Hardware Improves the Privacy of Network Monitoring , 2010, DPM/SETOP.

[14]  Aisha Abdallah,et al.  Secret sharing scheme security and performance analysis , 2015, 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE).