Analysis and comparison the security and performance of secret sharing schemes

Distributed storage systems merge a number of storage sites into a collective whole. Files are split into smaller pieces which are computationally manipulated and then distributed to the storage sites. It recovers some subset of pieces when a client wants to read a file whereas those pieces are comb...

Full description

Saved in:
Bibliographic Details
Main Authors: Abdallah, Aisha, Salleh, Mazleena
Format: Article
Published: Medwell Journals 2015
Subjects:
Online Access:http://eprints.utm.my/id/eprint/57800/
http://dx.doi.org/10.3923/ajit.2015.74.83
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
id my.utm.57800
record_format eprints
spelling my.utm.578002021-08-02T14:13:43Z http://eprints.utm.my/id/eprint/57800/ Analysis and comparison the security and performance of secret sharing schemes Abdallah, Aisha Salleh, Mazleena QA75 Electronic computers. Computer science Distributed storage systems merge a number of storage sites into a collective whole. Files are split into smaller pieces which are computationally manipulated and then distributed to the storage sites. It recovers some subset of pieces when a client wants to read a file whereas those pieces are combined to reconstruct the original file. Distributed storage systems are better than traditional single-site storage systems because they offer a variety of benefits such as availability, proximity and reliability. One of the basic methods used to disperse the data in storage systems are secret sharing schemes. In cryptography, secret sharing is a technique to share a secret among a group of members, each of which holds a portion of the secret. The secret can only be retrieved when a certain number of members combine their shares together while any combination with fewer shares has no extra information about the secret. There are many secret sharing schemes and each one achieves a different level of security with different performance and storage requirements. In this study, we analyze the security and performance of three secret schemes which are the most common schemes for information dispersal used within distributed storage systems, namely Shamir's scheme, Rabin's IDA and hybrid scheme. Several tests were conducted to understand the fundamental concept of the schemes as well as to explore the security, performance and the capability of the schemes. Medwell Journals 2015 Article PeerReviewed Abdallah, Aisha and Salleh, Mazleena (2015) Analysis and comparison the security and performance of secret sharing schemes. Asian Journal Of Information Technology, 14 (2). pp. 74-83. ISSN 1682-3915 http://dx.doi.org/10.3923/ajit.2015.74.83 DOI:10.3923/ajit.2016.26.35
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Abdallah, Aisha
Salleh, Mazleena
Analysis and comparison the security and performance of secret sharing schemes
description Distributed storage systems merge a number of storage sites into a collective whole. Files are split into smaller pieces which are computationally manipulated and then distributed to the storage sites. It recovers some subset of pieces when a client wants to read a file whereas those pieces are combined to reconstruct the original file. Distributed storage systems are better than traditional single-site storage systems because they offer a variety of benefits such as availability, proximity and reliability. One of the basic methods used to disperse the data in storage systems are secret sharing schemes. In cryptography, secret sharing is a technique to share a secret among a group of members, each of which holds a portion of the secret. The secret can only be retrieved when a certain number of members combine their shares together while any combination with fewer shares has no extra information about the secret. There are many secret sharing schemes and each one achieves a different level of security with different performance and storage requirements. In this study, we analyze the security and performance of three secret schemes which are the most common schemes for information dispersal used within distributed storage systems, namely Shamir's scheme, Rabin's IDA and hybrid scheme. Several tests were conducted to understand the fundamental concept of the schemes as well as to explore the security, performance and the capability of the schemes.
format Article
author Abdallah, Aisha
Salleh, Mazleena
author_facet Abdallah, Aisha
Salleh, Mazleena
author_sort Abdallah, Aisha
title Analysis and comparison the security and performance of secret sharing schemes
title_short Analysis and comparison the security and performance of secret sharing schemes
title_full Analysis and comparison the security and performance of secret sharing schemes
title_fullStr Analysis and comparison the security and performance of secret sharing schemes
title_full_unstemmed Analysis and comparison the security and performance of secret sharing schemes
title_sort analysis and comparison the security and performance of secret sharing schemes
publisher Medwell Journals
publishDate 2015
url http://eprints.utm.my/id/eprint/57800/
http://dx.doi.org/10.3923/ajit.2015.74.83
_version_ 1707765832638005248