RESCUE: Evaluation of a Fragmented Secret Share System in Distributed- Cloud Architecture
Total Page:16
File Type:pdf, Size:1020Kb
RESCUE: Evaluation of a Fragmented Secret Share System in Distributed- Cloud Architecture Elochukwu Anthony Ukwandu Matriculation Number: A thesis submitted in partial fulfilment of the requirements of Edinburgh Napier University, for the award of Doctor of Philosophy. Edinburgh Napier University School of Computing May, 2019 Acknowledgement It is with deep sense of gratitude that I say thanks to my Director of Studies, Prof. William J. Buchanan and Supervisor, Dr. Gordon Russell for their love, kindness and transformational influence during this research. I also want to thank the entire staff and researchers at Edinburgh Napier University, especially Drs. Lu Fan and Owen Lo, Prof. Ahmed Al-Dubai for their supports that enabled the completion of this work. I need to say a warmth thank you to my angelic wife, children and extended family for their supports, love, and peace that sustained me although this work. II Dedication To Him through whom all things consist, to my angelic wife and lovely children, and more to the fellow saints on Calvary journey. I cannot but also dedicate this thesis in memory of Prof. David Benyon, who initially was my Panel Chair but could not see the end of it. III Declaration I declare that no portion of this work has been submitted for any degree or professional qualification in any university or institution of learning elsewhere. IV Table of Contents Abstract.............................................................................................................XI Acronyms..................................................................................................................XIII 1 Introduction........................................................................................................1 1.1 Background ...........................................................................................................1 1.1.1 Cloud systems .............................................................................................................. 2 1.1.2 Secret shares ............................................................................................................... 2 1.2 Disaster Recovery and Fail-Over System ...............................................................3 1.3 Secret Sharing Scheme..........................................................................................5 1.4 Research Questions ..............................................................................................7 1.5 Aim and Objectives ...............................................................................................7 1.6 Contributions ........................................................................................................9 1.7 Thesis Structure .................................................................................................. 11 1.8 Publications ........................................................................................................ 12 2 Background ......................................................................................................14 2.1 Introduction ........................................................................................................ 14 2.2 Fundamentals of Computer Security .................................................................. 14 2.3 Data Striping: Uses and Applications .................................................................. 15 2.4 Mathematical Background.................................................................................. 15 2.4.1 Information Theory .................................................................................................... 15 2.4.2 Definition and History ................................................................................................ 16 2.4.3 Perfect Secret Sharing Scheme ................................................................................... 17 2.4.4 The Social Concept in Secret Sharing .......................................................................... 19 2.4.5 Non-Perfect Secret Sharing Scheme ........................................................................... 20 2.5 Conclusions ......................................................................................................... 22 3 Literature Review .............................................................................................23 3.1 Introduction ........................................................................................................ 23 3.2 Secret Sharing Scheme........................................................................................ 23 3.2.1 Shamir Secret Sharing Scheme (SSS) ........................................................................... 24 V 3.2.2 Information Dispersal Algorithm (IDA) ........................................................................ 25 3.2.3 Krawczyk’s Computational Secret Sharing................................................................... 26 3.2.4 Social Secret Sharing Scheme (SSSS) ........................................................................... 27 3.2.5 Secret Sharing and Multi-Cloud Architecture .............................................................. 29 3.2.6 Security Limitations of Secret Sharing Schemes .......................................................... 30 3.3 Secret Sharing/Data Striping: Applications ......................................................... 31 3.4 Performance Evaluation of Secret Sharing Schemes ........................................... 33 3.4.1 Scalability................................................................................................................... 33 3.4.2 Resilience ................................................................................................................... 34 3.4.3 Key management ....................................................................................................... 34 3.5 Sharing a big data ............................................................................................... 34 3.6 Cloud-based data storage ................................................................................... 35 3.6.1 Cloud-based Key Management System ....................................................................... 37 3.6.2 Cloud-based Disaster Recovery (DR) System ............................................................... 38 3.6.3 Benefits, Challenges and Solutions ............................................................................. 39 3.6.4 Fine-Grained Cloud-based DR solutions ...................................................................... 40 3.7 Weaknesses and research challenge of present methods................................... 42 3.8 Conclusions ......................................................................................................... 43 4 Experimental Design ........................................................................................45 4.1 Introduction ........................................................................................................ 45 4.2 Design Architecture ............................................................................................ 45 4.3 Design Principles ................................................................................................. 46 4.3.1 System components ................................................................................................... 46 4.4 System Design Methodology .............................................................................. 47 4.4.1 Experimental setup .................................................................................................... 47 4.4.2 Evaluation frameworks............................................................................................... 51 4.5 System Specifications ......................................................................................... 59 4.5.1 Virtual Machine Specifications ................................................................................... 59 4.6 Conclusions ......................................................................................................... 59 5 Data Fragmentation Evaluation .......................................................................61 5.1 Introduction ........................................................................................................ 61 5.2 Data fragmentation schemes .............................................................................. 61 VI 5.2.1 Application Scenarios ................................................................................................. 62 5.3 FSSS Evaluations ................................................................................................. 63 5.3.1 Method of Data Fragmentation .................................................................................. 63 5.3.2 Method of Key Sharing and Recovering ...................................................................... 64 5.4 Tests Results and Evaluations ............................................................................. 66 5.5 Overall Evaluation of Data Fragmentation Methods .......................................... 70 5.6 Conclusions ......................................................................................................... 72 6 Key Management Evaluation ...........................................................................73 6.1 Introduction .......................................................................................................