Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises

  • Christian Damsgaard Jensen
  • Fernando Meira
  • Jacob Nittegaard-Nielsen
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 238)


Most small and medium-sized enterprises (SME) operate from a single address, which means that backups are normally kept at the same physical location as the company’s computers. This means that fire, flooding or other disasters are likely to destroy both computers and the backups that were meant to ensure the continued operation of the company.

The price per Giga-byte of hard disk storage is falling and at the same time the bandwidth of the connection from small companies to the Internet is increasing, so it appears logical for small companies to achieve improved availability of their backups by storing backups on the hard disk of one or more remote computers. However, storing business-critical information or customer data on a foreign computer requires a mechanism that preserves the secrecy and ensures the integrity of the stored data.

This paper presents Resilia, which is a safe and secure backup system that allows a company to distribute its backup among a number of remote servers, thereby ensuring availability, without compromising the confidentiality and the integrity of the backup. The confidentiality of data in Resilia is ensured with an encryption technique known as threshold cryptography, which means that a backup can be restored even if all cryptographic keys are lost in a disaster. We describe a working prototype of Resilia and report initial performance numbers for the developed prototype.


Secret Sharing Secret Sharing Scheme Medium Enterprise Remote Node Backup System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    S. Armour (2006) Lost digital data cost businesses billions. In USA TODAY 12 June 2006.Google Scholar
  2. 2.
    Data Deposit Box (2007) Data Loss Quotes and Statistics. Available at URL:, visited 21 February 2007.
  3. 3.
    Sun Developer Network (2007) Java Tecchnology: Reference. Available at URL:, visited 21 February 2007
  4. 4.
    J. D. Gradecki (2002) Mastering JXTA: building Java peer-to-peer applications. Wiley PublishingGoogle Scholar
  5. 5.
    D. Dolev, A. C. Yao (1981) On the security of public key protocols. In Proceedings of the IEEE 22nd Annual Symposium on Foundations of Computer Science, pp. 350–357Google Scholar
  6. 6.
    A. Shamir (1979) How to share a secret. In Communications of the ACM, vol. 22, no. 11, pp. 612–613MATHCrossRefMathSciNetGoogle Scholar
  7. 7.
    G. R. Blakley (1979) Safeguarding cryptographic keys. In AFIPS 1979 NCC, Vol. 48, pp. 313–317.Google Scholar
  8. 8.
    P. Feldman (1987) A practical scheme for non-interactive verifiable secret sharing. In Proceedings of the 28th IEEE Symposium on Foundations of Computer Science (FOCS’ 87)Google Scholar
  9. 9.
    T. P. Pedersen (1991) Non-interactive and information-theoretic secure verifiable secret sharing. In Proceedings of Crypto’91 (LNCS 576), pp. 129–140Google Scholar
  10. 10.
    A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung (1995) Proactive secret sharing or: How to cope with perpetual leakage. In Proceedings of Crypto’95 (LNCS 963)Google Scholar
  11. 11.
    M. O. Rabin (1989) Efficient dispersal of information for security, load balancing, and fault tolerance. In Journal of the ACM, Vol. 36, No. 2, pp. 335–348MATHCrossRefMathSciNetGoogle Scholar
  12. 12.
    J. Nittegaard-Nielsen (2004) Sikkert og plideligt peer-to-peer filsystem. Master’s thesis, Technical University of Denmark (in Danish)Google Scholar
  13. 13.
    F. Meira (2005) Resilia: A safe & secure backup-system. Final year project, Engineerng Faculty of the University of PortoGoogle Scholar
  14. 14.
    S. Garfinkel (1994) PGP: Pretty Good Privacy. O’ReillyGoogle Scholar
  15. 15.
    C. Batten, K. Barr, A. Saraf, and S. Trepetin (2002) pStore: A secure peer-to-peer backup system. Technical Memo MIT-LCS-TM-632, Massachusetts Institute of Technology Laboratory for Computer ScienceGoogle Scholar
  16. 16.
    E. Martinian (2007) Distributed internet backup system (dibs). Available at URL
  17. 17.
    L. P. Cox and B. D. Noble (2003) Samsara: honor among thieves in peer-to-peer storage. In Proceedings of the nineteenth ACM symposium on Operating systems principlesGoogle Scholar
  18. 18.
    L. P. Cox, C. D. Murray, and B. D. Noble (2002) Pastiche: making backup cheap and easy. SIGOPS Opererating Systems Review, 36(SI):285–298CrossRefGoogle Scholar
  19. 19.
    CleverSafe Project (2007) Cleversafe dispersed storage project. Available at URL
  20. 20.
    G. Bella, C. Pistagna, S. Riccobene (2006) Distributed Backup through Information Dispersal. In Electronic Notes in Theoretical Computer Science, Vol 142:63–77CrossRefGoogle Scholar
  21. 21.
    I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, H. Balakrishnan (2001) Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proceedings of the 2001 ACM SIGCOMM ConferenceGoogle Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Christian Damsgaard Jensen
    • 1
  • Fernando Meira
    • 1
  • Jacob Nittegaard-Nielsen
    • 1
  1. 1.Informatics and Mathematical ModelingTechnical University of DenmarkDenmark

Personalised recommendations