Deploying Scalable and Secure Secret Sharing with GPU Many-Core Architecture
- 1 May 2012
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 1360-1369
- https://doi.org/10.1109/ipdpsw.2012.173
Abstract
Secret sharing is an excellent alternative to the traditional cryptographic algorithms due to its unkeyed encryption/decryption and fault tolerance features. Key management hassle faced in most encryption strategies is removed from users and the loss of a certain number of data copies can be tolerated. However, secret sharing schemes have to deal with two contradictory design goals: security and performance. Without keys' involvement, large security margin is expected for the illusion of being computationally secure. In the meantime, such design will degrade the performance of "encrypting" and "decrypting" secrets. Thus, secret sharing is mainly for small data such as keys and passwords. In order to apply secret sharing to large data sets, this paper redesigned the original schemes to balance the security and performance. With sufficient security margin, Graphics Processing Unit (GPU) is adopted to provide the performance satisfaction. The proposed secret sharing scheme with GPU acceleration is a practical choice for large volume data security. It is particularly good for long-term storage for its unkeyed encryption and fault tolerance. Performance analysis and experimental results have demonstrated the effectiveness and efficiency of the proposed scheme.Keywords
This publication has 6 references indexed in Scilit:
- On Post-Generation Data Operations in Secure Distributed Storage Systems with Internal PaddingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- POTSHARDS—a secure, recoverable, long-term archival storage systemACM Transactions on Storage, 2009
- HASS: Highly Available, Scalable and Secure Distributed Data Storage SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- How to Share a SecretPublished by Springer Science and Business Media LLC ,2000
- A modular approach to key safeguardingIEEE Transactions on Information Theory, 1983
- How to share a secretCommunications of the ACM, 1979