Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises
Most small and medium-sized enterprises (SME) operate from a single address, which means that backups are normally kept at the same physical location as the company’s computers. This means that fire, flooding or other disasters are likely to destroy both computers and the backups that were meant to ensure the continued operation of the company.
The price per Giga-byte of hard disk storage is falling and at the same time the bandwidth of the connection from small companies to the Internet is increasing, so it appears logical for small companies to achieve improved availability of their backups by storing backups on the hard disk of one or more remote computers. However, storing business-critical information or customer data on a foreign computer requires a mechanism that preserves the secrecy and ensures the integrity of the stored data.
This paper presents Resilia, which is a safe and secure backup system that allows a company to distribute its backup among a number of remote servers, thereby ensuring availability, without compromising the confidentiality and the integrity of the backup. The confidentiality of data in Resilia is ensured with an encryption technique known as threshold cryptography, which means that a backup can be restored even if all cryptographic keys are lost in a disaster. We describe a working prototype of Resilia and report initial performance numbers for the developed prototype.
KeywordsSecret Sharing Secret Sharing Scheme Medium Enterprise Remote Node Backup System
- 1.S. Armour (2006) Lost digital data cost businesses billions. In USA TODAY 12 June 2006.Google Scholar
- 2.Data Deposit Box (2007) Data Loss Quotes and Statistics. Available at URL: http://www.datadepositbox.com/media/data-loss-statistics.asp, visited 21 February 2007.
- 3.Sun Developer Network (2007) Java Tecchnology: Reference. Available at URL: http://www.java.sun.com/reference/index.html, visited 21 February 2007
- 4.J. D. Gradecki (2002) Mastering JXTA: building Java peer-to-peer applications. Wiley PublishingGoogle Scholar
- 5.D. Dolev, A. C. Yao (1981) On the security of public key protocols. In Proceedings of the IEEE 22nd Annual Symposium on Foundations of Computer Science, pp. 350–357Google Scholar
- 7.G. R. Blakley (1979) Safeguarding cryptographic keys. In AFIPS 1979 NCC, Vol. 48, pp. 313–317.Google Scholar
- 8.P. Feldman (1987) A practical scheme for non-interactive verifiable secret sharing. In Proceedings of the 28th IEEE Symposium on Foundations of Computer Science (FOCS’ 87)Google Scholar
- 9.T. P. Pedersen (1991) Non-interactive and information-theoretic secure verifiable secret sharing. In Proceedings of Crypto’91 (LNCS 576), pp. 129–140Google Scholar
- 10.A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung (1995) Proactive secret sharing or: How to cope with perpetual leakage. In Proceedings of Crypto’95 (LNCS 963)Google Scholar
- 12.J. Nittegaard-Nielsen (2004) Sikkert og plideligt peer-to-peer filsystem. Master’s thesis, Technical University of Denmark (in Danish)Google Scholar
- 13.F. Meira (2005) Resilia: A safe & secure backup-system. Final year project, Engineerng Faculty of the University of PortoGoogle Scholar
- 14.S. Garfinkel (1994) PGP: Pretty Good Privacy. O’ReillyGoogle Scholar
- 15.C. Batten, K. Barr, A. Saraf, and S. Trepetin (2002) pStore: A secure peer-to-peer backup system. Technical Memo MIT-LCS-TM-632, Massachusetts Institute of Technology Laboratory for Computer ScienceGoogle Scholar
- 16.E. Martinian (2007) Distributed internet backup system (dibs). Available at URL http://www.csua.berkeley.edu/~emin/source_code/dibs
- 17.L. P. Cox and B. D. Noble (2003) Samsara: honor among thieves in peer-to-peer storage. In Proceedings of the nineteenth ACM symposium on Operating systems principlesGoogle Scholar
- 19.CleverSafe Project (2007) Cleversafe dispersed storage project. Available at URL http://www.cleversafe.org/wiki/Cleversafe_Dispersed_Storage
- 21.I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, H. Balakrishnan (2001) Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proceedings of the 2001 ACM SIGCOMM ConferenceGoogle Scholar