Skip to main content

A Novel Data Encryption and Distribution Approach for High Security and Availability Using LU Decomposition

  • Conference paper
Computational Science and Its Applications – ICCSA 2004 (ICCSA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3046))

Included in the following conference series:

Abstract

As the society increasingly relies on digitally stored and accessed information, supporting the availability, persistence, integrity, and confidentiality of the information becomes more critical. Mirroring is a simple but practical approach allowing reasonable availability and accessibility, but it cannot provide security. This paper proposes an approach which integrates data encryption and distribution to allow high security while providing the same degree of availability as mirroring. It is based on LU decomposition of matrix. Analysis confirms that it allows slightly higher availability compared with mirroring scheme for both read and write operation. The proposed scheme needs almost the same storage space as mirroring.

This work was supported in part by 21C Frontier Ubiquitous Computing and Networking, Korea Research Foundation Grant (KRF – 2003 – 041 – D20421) and Brain Korea 21 Project in 2004. Corresponding author: Hee Yong Youn

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hsiao, H.-I., DeWitt, D.J.: A performance study of three high availability data replication strategies. In: Proceedings of ICPDIS, pp. 18–28 (1991)

    Google Scholar 

  2. Long, D.D.E.: A Technique for Managing Mirrored Disks, pp. 272–277. IEEE, Los Alamitos (2001)

    Google Scholar 

  3. Long, D.D.E.: The Management of Replication in a Distributed System. University of California, San Diego (1988)

    Google Scholar 

  4. Bakkaloglu, M., Wylie, J.J., Wang, C., Ganger, G.R.: On Correlated Failures in Survivable Storage Systems: School of Computer Science Carnegie Mellon University, Pittsburgh, PA15213 (2002)

    Google Scholar 

  5. Cannetti, R., Gennaro, R., Jarecki, S., Krawcxyk, H., Rabin, T.: Adaptive Security for Threshold Cryptosystems. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 98–115. Springer, Heidelberg (1999)

    Google Scholar 

  6. Blakley, G.R., Meadows, C.: Security of ramp schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 242–268. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  7. Menon, J., Riegel, J., Wyllie, J.C.: Algorithms for Software and Low-Cost Hardware RAIDs. In: COMPCON, pp. 411–418 (1995)

    Google Scholar 

  8. Patterson, D.A., Gibson, G.A., Katz, R.H.: A Case for Redundant Arrays of Inexpensive Disks (RAID). In: Proceeding of SIGMOD Conference, pp. 109–116 (1988)

    Google Scholar 

  9. Santis, D., Masucci, B.: Multiple Ramp Schemes. IEEE Trans. Information Theory, 1720–1728 (1999)

    Google Scholar 

  10. Karnin, E., Greene, J., Hellman, M.: On Secret Sharing Systems. IEEE Trans. Information Theory, 35–41 (1983)

    Google Scholar 

  11. Krawczyk, H.: Distributed fingerprints and secure information dispersal. In: ACM Symposium on Principles of Distributed Computing, pp. 207–218 (1993)

    Google Scholar 

  12. Castro, M., Liskov, B.: Practical Byzantine fault tolerance. In: Symposium on Operating Systems Design and Implementation, pp. 173–186. ACM Press, New York (1999)

    Google Scholar 

  13. Iyengar, A., et al.: Design and Implementation of a Secure Distributed Computing Systems. In: Proc. 14th IFIP International Information Security Conference (SEC 1998), ACM Press, New York (1998)

    Google Scholar 

  14. Deswarte, Y., Blain, L., Fabre, J.-C.: Intrusion tolerance in distributed computing systems. In: IEEE Symposium on Security and Privacy, pp. 110–121 (1991)

    Google Scholar 

  15. Birkhauser: Linear Algebra, pp. 33–37. Birkhauser, Boston (1997)

    Google Scholar 

  16. Nakos, G., Joyner, D.: Linear Algebra with Applications, pp. 188–194. Brooks/Cole, USA (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choi, S.J., Youn, H.Y. (2004). A Novel Data Encryption and Distribution Approach for High Security and Availability Using LU Decomposition. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3046. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24768-5_68

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24768-5_68

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22060-2

  • Online ISBN: 978-3-540-24768-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics