How to Best Share a Big Secret

VenueCategory
SYSTOR'18Secure Deduplication

How to Best Share a Big Secret1. SummaryMotivation of this paperHow to best share a big secretImplementation and Evaluation2. Strength (Contributions of the paper)3. Weakness (Limitations of the paper)4. Some Insights (Future work)

1. Summary

Motivation of this paper

How to best share a big secret

image-20200923153649390

image-20200923153618230

Implementation and Evaluation

2. Strength (Contributions of the paper)

  1. This work mentions information-theoretical security is infeasible in real system implementations

high cost of true random data generation.

  1. The bottleneck in real implementations shifts from
  1. computational complexity
  2. storage throughput (on local storage)
  3. network bandwidth (in cloud deployments)
  1. This paper also suggests that encrypting the data and dispersing the keys with an efficient secret sharing scheme is optimal for multi-cloud environments

3. Weakness (Limitations of the paper)

4. Some Insights (Future work)

  1. Security issue in cloud Majority of cloud service providers do not specify in their terms of service that data is owned by the customers, and lack security mechanisms to protect it.

data leakage from the cloud have been recently documented.

  1. drawback of the single cloud

vendor lock-in outage that a single cloud provider might suffer

  1. Data encryption AES: fixed-length string: 128 bits

AES-128: key size is 128 bits AES-256: key size is 256 bits