The Archistar Secret-Sharing Backup Proxy

被引:8
|
作者
Happe, Andreas [1 ]
Wohner, Florian [1 ]
Loruenser, Thomas [1 ]
机构
[1] AIT, Ctr Digital Safety & Secur, Vienna, Austria
关键词
distributed system; secret sharing; cloud storage; backup system; CLOUD SERVICES; INFORMATION; SECURITY;
D O I
10.1145/3098954.3104055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud-Storage has become part of the standard toolkit for enterprise-grade computing. While being cost- and energy-efficient, cloud storage's availability and data confidentiality can be problematic. A common approach of mitigating those issues are cloud-of-cloud solutions. Another challenge is the integration of such a solution into existing legacy systems. This paper introduces the Archistar Backup Proxy which allows integration of multi-cloud storage into existing legacy enterprise computing landscapes by overloading the industry-standard Amazon S3 protocol. The paper provides multiple lessons-learned during implementation and concludes with a performance evaluation with traditional backup solutions utilizing redundant remote storage.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] ON SECRET-SHARING MATROIDS
    SEYMOUR, PD
    [J]. JOURNAL OF COMBINATORIAL THEORY SERIES B, 1992, 56 (01) : 69 - 73
  • [2] Secret-Sharing for NP
    Komargodski, Ilan
    Naor, Moni
    Yogev, Eylon
    [J]. JOURNAL OF CRYPTOLOGY, 2017, 30 (02) : 444 - 469
  • [3] Secret-Sharing for NP
    Ilan Komargodski
    Moni Naor
    Eylon Yogev
    [J]. Journal of Cryptology, 2017, 30 : 444 - 469
  • [4] Secret-Sharing for NP
    Komargodski, Ilan
    Naor, Moni
    Yogev, Eylon
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 254 - 273
  • [5] Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme
    Sun, Yuxia
    Liu, Dan
    [J]. MOBILE NETWORKS & APPLICATIONS, 2017, 22 (02): : 209 - 215
  • [6] Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme
    Yuxia Sun
    Dan Liu
    [J]. Mobile Networks and Applications, 2017, 22 : 209 - 215
  • [7] On the power of nonlinear secret-sharing
    Beimel, A
    Ishai, Y
    [J]. 16TH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS, 2000, : 188 - 202
  • [8] On the power of nonlinear secret-sharing
    Beimel, A
    Ishai, Y
    [J]. SIAM JOURNAL ON DISCRETE MATHEMATICS, 2005, 19 (01) : 258 - 280
  • [9] Genuine secret-sharing states
    Choi, Minjin
    Lee, Soojoon
    [J]. QUANTUM INFORMATION PROCESSING, 2021, 20 (01)
  • [10] Genuine secret-sharing states
    Minjin Choi
    Soojoon Lee
    [J]. Quantum Information Processing, 2021, 20