Abstract

Distributed storage systems merge a number of storage sites into a collective whole. Files are split into smaller pieces which are computationally manipulated and then distributed to the storage sites. It recovers some subset of pieces when a client wants to read a file whereas those pieces are combined to reconstruct the original file. Distributed storage systems are better than traditional single-site storage systems because they offer a variety of benefits such as availability, proximity and reliability. One of the basic methods used to disperse the data in storage systems are secret sharing schemes. In cryptography, secret sharing is a technique to share a secret among a group of members, each of which holds a portion of the secret. The secret can only be retrieved when a certain number of members combine their shares together while any combination with fewer shares has no extra information about the secret. There are many secret sharing schemes and each one achieves a different level of security with different performance and storage requirements. In this study, we analyze the security and performance of three secret schemes which are the most common schemes for information dispersal used within distributed storage systems, namely Shamir’s scheme, Rabin’s IDA and hybrid scheme. Several tests were conducted to understand the fundamental concept of the schemes as well as to explore the security, performance and the capability of the schemes.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.