Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3211890.3211896acmconferencesArticle/Chapter ViewAbstractPublication PagessystorConference Proceedingsconference-collections
research-article

How to Best Share a Big Secret

Published: 04 June 2018 Publication History

Abstract

When sensitive data is stored in the cloud, the only way to ensure its secrecy is by encrypting it before it is uploaded. The emerging multi-cloud model, in which data is stored redundantly in two or more independent clouds, provides an opportunity to protect sensitive data with secret-sharing schemes. Both data-protection approaches are considered computationally expensive, but recent advances reduce their costs considerably: (1) Hardware acceleration methods promise to eliminate the computational complexity of encryption, but leave clients with the challenge of securely managing encryption keys. (2) Secure RAID, a recently proposed scheme, minimizes the computational overheads of secret sharing, but requires non-negligible storage overhead and random data generation. Each data-protection approach offers different tradeoffs and security guarantees. However, when comparing them, it is difficult to determine which approach will provide the best application-perceived performance, because previous studies were performed before their recent advances were introduced.
To bridge this gap, we present the first end-to-end comparison of state-of-the-art encryption-based and secret sharing data protection approaches. Our evaluation on a local cluster and on a multi-cloud prototype identifies the tipping point at which the bottleneck of data protection shifts from the computational overhead of encoding and random data generation to storage and network bandwidth and global availability.

References

[1]
2006. Amazon EC2. https://aws.amazon.com/ec2/. (2006).
[2]
2017. Netskope Report Reveals Bulk of Cloud Services Still Not GDPR-Ready. https://www.netskope.com/press-releases/netskope-report-reveals-bulk-cloud-services-still-not-gdpr-ready/. (18 Sept. 2017).
[3]
2017. OpenSSL. http://www.openssl.org. (2017).
[4]
2018. Amazon EC2 Instance Types. https://aws.amazon.com/ec2/instance-types/. (2018).
[5]
2018. Submarine Cable Map. https://www.submarinecablemap.com/. (Feb. 2018).
[6]
Abhishek Agarwal and Arya Mazumdar. 2015. Security in locally repairable storage. Manuscript, arXiv:1503.04244 (2015).
[7]
Fahad Alsolami and C. Edward Chow. 2013. N-Cloud: improving performance and security in cloud storage. In IEEE International Conference on High Performance Switching and Routing (HPSR '13).
[8]
Amos Beimel. 2011. Secret-sharing schemes: a survey. In International Conference on Coding and Cryptology.
[9]
David Bermbach, Markus Klems, Stefan Tai, and Michael Menzel. 2011. MetaStorage: A Federated Cloud Storage System to Manage Consistency-Latency Tradeoffs. In IEEE International Conference on Cloud Computing (CLOUD '11).
[10]
Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, and Paulo Sousa. 2013. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. Trans. Storage 9,4, Article 12 (Nov. 2013), 33 pages.
[11]
Alysson Bessani, Ricardo Mendes, Tiago Oliveira, Nuno Neves, Miguel Correia, Marcelo Pasin, and Paulo Verissimo. 2014. SCFS: A Shared Cloud-backed File System. In USENIX Annual Technical Conference (ATC '14).
[12]
George Robert Blakley and Catherine Meadows. 1984. Security of Ramp Schemes. In Workshop on the Theory and Application of Cryptographic Techniques.
[13]
Marco Bucci, Lucia Germani, Raimondo Luzzi, Alessandro Trifiletti, and Mario Varanonuovo. 2003. A high-speed oscillator-based truly random number source for cryptographic applications on a smart card IC. IEEE Trans. Comput. 52, 4 (2003), 403--409.
[14]
Dorian Burihabwa, Pascal Felber, Hugues Mercier, and Valerio Schiavoni. 2016. A Performance Evaluation of Erasure Coding Libraries for Cloud-Based Data Stores. In IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS '16).
[15]
Christian Cachin, Robert Haas, and Marko Vukolic. 2010. Dependable Storage in the Intercloud. Technical Report RZ 3783. IBM.
[16]
Joan Daemen and Vincent Rijmen. 2013. The Design of Rijndael: AES - The Advanced Encryption Standard. Springer Science & Business Media.
[17]
Don Davis, Ross Ihaka, and Philip Fenstermacher. 1994. Cryptographic randomness from air turbulence in disk drives. In Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '94).
[18]
Tim Dierks. 2008. The transport layer security (TLS) protocol version 1.2. (2008).
[19]
Dan Dobre, Paolo Viotti, and Marko Vukolic. 2014. Hybris: Robust hybrid cloud storage. In Annual ACM Symposium on Cloud Computing (SOCC '14).
[20]
Fred Doughs, Abhinav Duggal, Philip Shilane, Tony Wong, Shiqin Yan, and Fabiano Botelho. 2017. The Logic of Physical Garbage Collection in Deduplicating Storage. In USENIX Conference on File and Storage Technologies (FAST '17).
[21]
Min Fu, Dan Feng, Yu Hua, Xubin He, Zuoning Chen, Wen Xia, Fangting Huang, and Qing Liu. 2014. Accelerating Restore and Garbage Collection in Deduplication-based Backup Systems via Exploiting Historical Information. In USENIX Annual Technical Conference (ATC '14).
[22]
Vindu Goel and Nicole Perlroth. 2016. Yahoo says 1 billion user accounts were hacked. https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html. (14 Dec. 2016).
[23]
Shay Gueron. 2010. Intel® Advanced Encryption Standard (AES) New Instructions Set. Intel Corporation (2010).
[24]
Zvi Gutterman, Benny Pinkas, and Tzachy Reinman. 2006. Analysis of the Linux random number generator. In IEEE Symposium on Security and Privacy (S&P '06).
[25]
Andreas Haeberlen, Alan Mislove, and Peter Druschel. 2005. Glacier: Highly durable, decentralized storage despite massive correlated failures. In USENIX Symposium on Networked Systems Design & Implementation (NSDI '05).
[26]
Mike Hamburg, Paul Kocher, and Mark E Marson. 2012. Analysis of Intel's Ivy Bridge digital random number generator. Technical Report, Cryptography Research Inc. (Mar. 2012).
[27]
W. Timothy Holman, J. Alvin Connelly, and Ahmad B. Dowlatabadi. 1997. An integrated analog/digital random noise source. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 44, 6 (1997), 521--528.
[28]
Cheng Huang, Huseyin Simitci, Yikang Xu, Aaron Ogus, Brad Calder, Parikshit Gopalan, Jin Li, and Sergey Yekhanin. 2012. Erasure coding in Windows Azure storage. In USENIX Annual Technical Conference (ATC '12).
[29]
Wentao Huang and Jehoshua Bruck. 2016. Secure RAID schemes for distributed storage. In IEEE International Symposium on Information Theory (ISIT '16).
[30]
Wentao Huang and Jehoshua Bruck. 2017. Generic Secure Repair for Distributed Storage. CoRR abs/1706.00500 (2017).
[31]
Wentao Huang and Jehoshua Bruck. 2017. Secure RAID schemes from EVENODD and STAR codes. In IEEE International Symposium on Information Theory (ISIT '17).
[32]
Wentao Huang, Michael Langberg, Jörg Kliewer, and Jehoshua Bruck. 2015. Communication Efficient Secret Sharing. CoRR abs/1505.07515 (2015).
[33]
Wentao Huang, Michael Langberg, Joerg Kliewer, and Jehoshua Bruck. 2016. Communication efficient secret sharing. IEEE Transactions on Information Theory 62, 12 (2016), 7195--7206.
[34]
Jacob Kastrenakes. 2017. Amazon's web servers are down and it's causing trouble across the internet. https://www.theverge.com/2017/2/28/14765042/amazon-s3-outage-causing-trouble. (28 Mar. 2017).
[35]
Brendan Kerrigan and Yu Chen. 2012. A study of entropy sources in cloud computers: random number generation on cloud hosts. Computer Network Security (2012), 286--298.
[36]
Osama Khan, Randal C Burns, James S Plank, William Pierce, and Cheng Huang. 2012. Rethinking Erasure Codes for Cloud File Systems: Minimizing I/O for Recovery and Degraded Reads. In 10th Usenix Conference on File and Storage Technologies (FAST '12).
[37]
Ankit Singh Rawat Koyluoglu, Onur Ozan and Sriram Vishwanath. 2014. Secure Cooperative Regenerating Codes for Distributed Storage Systems. IEEE Transactions on Information Theory 60, 9 (Sept 2014), 5228--5244.
[38]
Hugo Krawczyk. 1994. Secret Sharing Made Short. In Annual International Cryptology Conference on Advances in Cryptology.
[39]
John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels, Ramakrishan Gummadi, Sean Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, and Ben Zhao. 2000. OceanStore: An Architecture for Global-scale Persistent Storage. SIGPLAN Not. 35, 11 (Nov. 2000), 190--201.
[40]
Rinkesh Kukreja. 2016. The 11 Worst Cloud Outages (Fiascos) of 2016. https://www.stacktunnel.com/worst-cloud-outages-fiascos-2016.html. (2016).
[41]
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, and Toshiaki Tanaka. 2008. A new (k, n)-threshold secret sharing scheme and its extension. In International Conference on Information Security (ISC '08).
[42]
Adam Langley, Wan-Teh Chang, Nikos Mavrogiannopoulos, Joachim Strombergson, and Simon Josefsson. 2016. ChaCha20-Poly1305 cipher suites for transport layer security (TLS). RFC 7905.
[43]
Andrew W. Leung and Ethan L. Miller. 2006. Scalable Security for Large, High Performance Storage Systems. In ACM Workshop on Storage Security and Survivability (StorageSS '06).
[44]
Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick PC Lee, and Wenjing Lou. 2014. Secure Deduplication with Efficient and Reliable Convergent Key Management. IEEE Transactions on Parallel and Distributed Systems 25, 6 (June 2014), 1615--1625.
[45]
Mingqiang Li and Patrick P.C. Lee. 2014. Stair codes: A general family of erasure codes for tolerating device and sector failures in practical storage systems. In USENIX Conference on File and Storage Technologies (FAST '14).
[46]
Mingqiang Li, Chuan Qin, and Patrick P. C. Lee. 2015. CDStore: Toward Reliable, Secure, and Cost-efficient Cloud Storage via Convergent Dispersal. In USENIX Conference on Usenix Annual Technical Conference (ATC '15).
[47]
Mingqiang Li, Chuan Qin, Patrick P. C. Lee, and Jin Li. 2014. Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of-Clouds. In USENIX Workshop on Hot Topics in Storage and File Systems (Hot-Storage '14).
[48]
Yan Li, Nakul Sanjay Dhotre, Yasuhiro Ohara, Thomas M. Kroeger, Ethan Miller, and Darrell D. E. Long. 2013. Horus: Fine-Grained Encryption-Based Security for Large-Scale Storage. In USENIX Conference on File and Storage Technologies (FAST '13).
[49]
Chunli Lv, Xiaoqi Jia, Lijun Tian, Jiwu Jing, and Mingli Sun. 2010. Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVEOR Operations. In International Conference on Network and System Security (NSS '10).
[50]
Robert J. McEliece and Dilip V. Sarwate. 1981. On Sharing Secrets and Reed-Solomon Codes. Commun. ACM 24, 9 (Sept. 1981), 583--584.
[51]
Ethan L. Miller, Darrell D. E. Long, William E. Freeman, and Benjamin C. Reed. 2002. Strong Security for Network-attached Storage. In USENIX Conference on File and Storage Technologies (FAST '02).
[52]
Mihir Nanavati, Patrick Colp, Bill Aiello, and Andrew Warfield. 2014. Cloud Security: A Gathering Storm. Commun. ACM 57, 5 (May 2014), 70--79.
[53]
Zhongying Niu, Ke Zhou, Dan Feng, Hong Jiang, Frank Wang, Hua Chai, Wei Xiao, and Chunhua Li. 2007. Implementing and Evaluating Security Controls for an Object-Based Storage System. In IEEE Conference on Mass Storage Systems and Technologies (MSST '07).
[54]
Justice Opara-Martins, Reza Sahandi, and Feng Tian. 2016. Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective. Journal of Cloud Computing 5, 1 (2016), 4.
[55]
Dan O'Sullivan. 2017. Cloud Leak: How A Verizon Partner Exposed Millions of Customer Accounts. https://www.upguard.com/breaches/verizon-cloud-leak. (2017).
[56]
Dan O'Sullivan. 2017. The RNC Files: Inside the Largest US Voter Data Leak. https://www.upguard.com/breaches/the-rnc-files. (2017).
[57]
John Ousterhout, Arjun Gopalan, Ashish Gupta, Ankita Kejriwal, Collin Lee, Behnam Montazeri, Diego Ongaro, Seo Jin Park, Henry Qin, Mendel Rosenblum, Stephen Rumble, Ryan Stutsman, and Stephen Yang. 2015. The RAMCloud Storage System. ACM Trans. Comput. Syst. 33, 3, Article 7 (Aug. 2015), 55 pages.
[58]
Doyel Pal, Praveenkumar Khethavath, Johnson P. Thomas, and Tingting Chen. 2015. Multilevel Threshold Secret Sharing in Distributed Cloud. In International Symposium on Security in Computing and Communications (SSCC).
[59]
Sameer Pawar, Salim El Rouayheb, and Kannan Ramchandran. 2011. Securing Dynamic Distributed Storage Systems Against Eavesdropping and Adversarial Attacks. IEEE Transactions on Information Theory 57, 10 (Oct 2011), 6734--6753.
[60]
Nicole Perlroth. 2016. Yahoo says hackers stole data on 500 million users in 2014. https://www.nytimes.com/2016/09/23/technology/yahoo-hackers.html. (23 Sept. 2016).
[61]
James S. Plank and Mario Blaum. 2014. Sector-Disk (SD) Erasure Codes for Mixed Failure Modes in RAID Systems. Trans. Storage 10, 1, Article 4 (Jan. 2014), 4:1--4:17 pages.
[62]
James S. Plank, Kevin M. Greenan, and Ethan L. Miller. 2013. Screaming Fast Galois Field Arithmetic Using Intel SIMD Instructions. In USENIX Conference on File and Storage Technologies (FAST '13).
[63]
KV Rashmi, Nihar B. Shah, Kannan Ramchandran, and P Vijay Kumar. 2012. Regenerating codes for errors and erasures in distributed storage. In IEEE International Symposium on Information Theory (ISIT '12).
[64]
Ankit Singh Rawat, Onur Ozan Koyluoglu, Natalia Silberstein, and Sriram Vishwanath. 2014. Optimal Locally Repairable and Secure Codes for Distributed Storage Systems. IEEE Transactions on Information Theory 60, 1 (Jan 2014), 212--236.
[65]
Irving S. Reed and Gustave Solomon. 1960. Polynomial codes over certain finite fields. J. Soc. Indust. Appl. Math. 8, 2 (1960), 300--304.
[66]
Jason K. Resch and James S. Plank. 2011. AONT-RS: blending security and performance in dispersed storage systems. In USENIX Conference on File and Stroage Technologies (FAST '11).
[67]
Sean C. Rhea, Patrick R. Eaton, Dennis Geels, Hakim Weatherspoon, Ben Y. Zhao, and John Kubiatowicz. 2003. Pond: the OceanStore prototype. In USENIX Conference on File and Storage Technologies (FAST '03).
[68]
Birenjith Sasidharan, P Vijay Kumar, Nihar B. Shah, KV Rashmi, and Kishore Ramachandran. 2014. Optimality of the product-matrix construction for secure MSR regenerating codes. In International Symposium on Communications, Control and Signal Processing (ISCCSP '14).
[69]
Nihar B. Shah, KV Rashmi, and P Vijay Kumar. 2011. Information-Theoretically Secure Regenerating Codes for Distributed Storage. In IEEE Global Telecommunications Conference (GLOBECOM '11).
[70]
Adi Shamir. 1979. How to Share a Secret. Commun. ACM 22, 11 (Nov. 1979), 612--613.
[71]
Roman Shor. 2018. Efficiently Combining Confidentiality and Availability in Distributed Storage Systems. Master's thesis. Technion, Israel Institute of Technology.
[72]
Konstantin Shvachko, Hairong Kuang, Sanjay Radia, and Robert Chansler. 2010. The Hadoop Distributed File System. In IEEE Symposium on Mass Storage Systems and Technologies (MSST '10).
[73]
Kiran Srinivasan, Tim Bisson, Garth Goodson, and Kaladhar Voruganti. 2012. iDedup: Latency-aware, inline data deduplication for primary storage. In USENIX Conference on File and Storage Technologies (FAST '12).
[74]
Mark W. Storer, Kevin Greenan, Darrell D.E. Long, and Ethan L. Miller. 2008. Secure Data Deduplication. In ACM International Workshop on Storage Security and Survivability (StorageSS '08).
[75]
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, and Kaladhar Voruganti. 2009. POTSHARDS - a secure, recoverable, long-term archival storage system. ACM Transactions on Storage 5, 2 (2009), 1--35.
[76]
Satoshi Takahashi and Keiichi Iwamura. 2013. Secret Sharing Scheme Suitable for Cloud Computing. In IEEE International Conference on Advanced Information Networking and Applications (AINA '13).
[77]
Ravi Tandon, SaiDhiraj Amuru, Thomas Charles Clancy, and Richard Michael Buehrer. 2016. Toward Optimal Secure Distributed Storage Systems With Exact Repair. IEEE Transactions on Information Theory 62, 6 (2016), 3477--3492.
[78]
Yongge Wang. 2015. Privacy-Preserving Data Storage in Cloud Using Array BP-XOR Codes. IEEE Transactions on Cloud Computing 3, 4 (Oct 2015), 425--435.
[79]
Sage A. Weil, Scott A. Brandt, Ethan L. Miller, Darrell D. E. Long, and Carlos Maltzahn. 2006. Ceph: A Scalable, High-performance Distributed File System. In USENIX Symposium on Operating Systems Design and Implementation (OSDI '06).
[80]
Aaron D. Wyner. 1975. The wire-tap channel. The Bell System Technical Journal 54, 8 (Oct 1975), 1355--1387.
[81]
Benjamin Zhu, Kai Li, and Hugo Patterson. 2008. Avoiding the Disk Bottleneck in the Data Domain Deduplication File System. In USENIX Conference on File and Storage Technologies (FAST '08).

Cited By

View all
  • (2024)A blockchain based scheme for distributed storage of nuclear power plant imagesKerntechnik10.1515/kern-2023-008889:1(67-76)Online publication date: 30-Jan-2024
  • (2023)Oblivious PaxosProceedings of the 2023 ACM Symposium on Cloud Computing10.1145/3620678.3624647(65-80)Online publication date: 30-Oct-2023
  • (2023)Distributed Storage Over a Public Channel: Trade-off between Privacy and Shared Key Lengths2023 59th Annual Allerton Conference on Communication, Control, and Computing (Allerton)10.1109/Allerton58177.2023.10313393(1-5)Online publication date: 26-Sep-2023
  • Show More Cited By
  1. How to Best Share a Big Secret

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SYSTOR '18: Proceedings of the 11th ACM International Systems and Storage Conference
    June 2018
    144 pages
    ISBN:9781450358491
    DOI:10.1145/3211890
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 June 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    SYSTOR '18
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 108 of 323 submissions, 33%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)42
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 14 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A blockchain based scheme for distributed storage of nuclear power plant imagesKerntechnik10.1515/kern-2023-008889:1(67-76)Online publication date: 30-Jan-2024
    • (2023)Oblivious PaxosProceedings of the 2023 ACM Symposium on Cloud Computing10.1145/3620678.3624647(65-80)Online publication date: 30-Oct-2023
    • (2023)Distributed Storage Over a Public Channel: Trade-off between Privacy and Shared Key Lengths2023 59th Annual Allerton Conference on Communication, Control, and Computing (Allerton)10.1109/Allerton58177.2023.10313393(1-5)Online publication date: 26-Sep-2023
    • (2022)Quantifying the Cost of Privately Storing Data in Distributed Storage SystemsIEEE Transactions on Information Theory10.1109/TIT.2022.319300568:11(7485-7499)Online publication date: Nov-2022
    • (2022)Quantifying the Cost of Privately Storing Data in Distributed Storage Systems2022 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT50566.2022.9834900(3274-3279)Online publication date: 26-Jun-2022
    • (2020)On Fault Tolerance, Locality, and Optimality in Locally Repairable CodesACM Transactions on Storage10.1145/338183216:2(1-32)Online publication date: 22-May-2020
    • (2020)Secure Secret Sharing with Adaptive Bandwidth in Distributed Cloud Storage SystemsIEEE Access10.1109/ACCESS.2020.3001007(1-1)Online publication date: 2020
    • (2018)Efficient Reconstruction Techniques for Disaster Recovery in Secret-Split Datastores2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)10.1109/MASCOTS.2018.00014(66-78)Online publication date: Sep-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media