Responsive security for stored data

S. Lakshmanan, M. Ahamad, H. Venkateswaran
23rd International Conference on Distributed Computing Systems, 2003. Proceedings.  
We present the design of a distributed store that offers various levels of security guarantees while tolerating a limited number of nodes that are compromised by an adversary. The store uses secret sharing schemes to offer security guarantees namely availability, confidentiality and integrity. However, a pure secret sharing scheme could suffer from performance problems and high access costs. We integrate secret sharing with replication for better performance and to keep access costs low. The
more » ... s costs low. The tradeoffs involved between availability and access cost on one hand and confidentiality and integrity on the other are analyzed. Our system differs from traditional approaches such as state machine or quorum based replication that have been developed to tolerate Byzantine failures. Unlike such systems, we augment replication with secret sharing and demonstrate that such a hybrid scheme offers additional flexibility that is not possible with current schemes.
doi:10.1109/icdcs.2003.1203461 dblp:conf/icdcs/LakshmananAV03 fatcat:xz7p67gw6fdd3iqakzh5ilcl4q