Fragmented Data Processing: An Approach to Secure and Reliable Processing in Distributed Computing Systems

  • Jean-Michel Fray
  • Jean-Charles Fabre
Part of the Dependable Computing and Fault-Tolerant Systems book series (DEPENDABLECOMP, volume 4)


This paper presents a new approach for solving the problem of reliable processing of sensitive information in distributed computing systems1. Distributed systems offer redundancy that can be used to enhance reliability by means of adequate fault tolerance mechanisms. For security requirements, a given computer cannot be used to run any application . Consequently, only a given set of trusted processors can be used, thus reducing the flexibility of the network. In this paper, we first discuss the problem of ensuring both security and reliability in distributed systems. Then we present the principles of a new approach (Fragmented Data Processing), which is currently being investigated at LAAS, and that seems to be a promising approach to solve, at least partially, the problem of Secure and Reliable Processing in Distributed Computing Systems.


Local Area Network Sensitive Information Granularity Level Distribute Computing System Reliable Processing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    A. Avizienis, J.C. Laprie, “Dependable computing: from concepts to design diversity”, Proc. of the IEEE, Vol. 74-5, pp. 629–638, May 86.CrossRefGoogle Scholar
  2. [2]
    J. Bartlett, “A non-stop operating system”, Proc. of the 8th Symp. on Operating Systems Principles, Pacific Grove, California, USA, pp. 20–29, Dec. 87.Google Scholar
  3. [3]
    D.E. Denning, Cryptography and data security, Addison Wesley, 1983.Google Scholar
  4. [4]
    J.C. Fabre, Y. Deswarte, J.C. Laprie, D. Powell, “Saturation: reduced idleness for improved fault-tolerance”, Proc. of the 18th Symp. on Fault-Tolerant Computing, FTCS-18, Tokyo, Japan, June 1988, pp. 200–205.Google Scholar
  5. [5]
    J. Fraga, D. Powell, “A fault and intrusion-tolerant file system”, Proc. of the third Int. Cong. on Computer Security (IFIP/SEC’85), Dublin, Aug. 85, pp. 203–218.Google Scholar
  6. [6]
    J.M. Fray, Y. Deswarte, D. Powell, “Intrusion-tolerance using fine-grain fragmentation-scattering”, Proc. of the 1986 IEEE Symp. on Security and Privacy, Oakland, April 1986, pp. 194–201.Google Scholar
  7. [7]
    A.L. Hopkins, T.B. Smith, J.H. Lala, “FTMP: A highly reliable fault-tolerant multiprocessor for aircraft”, Proc. of the IEEE, Vol. 66, n° 10, October 1978, pp. 1221–1239.CrossRefGoogle Scholar
  8. [8]
    Y.Koga, E. Fukushima, K. Yoshihara, “Error recoverable and securable data communication for computer network”, Proc. of FTCS-12, Santa Monica, June 1982, pp. 183–186.Google Scholar
  9. [9]
    J.C. Laprie, “Dependability: a unifying concept for reliable computing and fault-tolerance”, in Resilient Computing Systems, Collins (UK) and Wiley (USA), T. Anderson editor, 1988.Google Scholar
  10. [10]
    C.H. Meyer, S.M. Matyas, Cryptography, J.Wiley & Sons, 1982.MATHGoogle Scholar
  11. [11]
    D. Powell, G. Bonn, D. Seaton, P. Verissimo, F. Waeselynck, “The DELTA-4 approach to dependability in open distributed computing systems”, Proc. of the 18th Symp. on Fault-Tolerant Computing, FTCS-18, Tokyo, Japan, June 1988, pp. 246–251.Google Scholar
  12. [12]
    M.O. Rabin, “Efficient Dispersal of Information for Security, Load Balancing, and Fault-Tolerance”, Journal of the ACM, Vol. 36, n° 2, April 1989, pp. 335–348.MathSciNetMATHCrossRefGoogle Scholar
  13. [13]
    P.G. Ranéa, Y. Deswarte, J.M. Fray, D. Powell, “The Security Approach in DELTA-4”, Proc. of the European Telematic Conference (EUTECO 88) on Research into Networks and Distributed Applications, Vienna, Austria, April 88, Ed. North-Holland, pp. 455–466.Google Scholar
  14. [14]
    B. Randell, “Fault-tolerance and system structuring”, Proc. of the 4th Jerusalem Conference on Information technology, Jerusalem, Israel, May 1984, pp. 158–169.Google Scholar
  15. [15]
    R.L. Rivest, L. Adleman, M.L. Dertouzos, “On data banks and privacy homomorphisms”, Foundations of secure computations, Academic Press 1978, pp. 169–179.Google Scholar
  16. [16]
    J. Rushby, B. Randell, “A distributed secure system”, IEEE Computer Mag., Vol. 16-7, July 1983, pp. 55–67.Google Scholar
  17. [17]
    A. Shamir, “How to share a secret”, Communications of ACM, Vol. 22, n° 11, November 1979, pp. 612–613.MathSciNetMATHCrossRefGoogle Scholar
  18. [18]
    T.B. Smith, “High performance fault-tolerant real-time computer architecture”, Proc. of the 16th Symposium on Fault-Tolerant Computing, Vienna, Austria, July 1986, pp. 14–19.Google Scholar
  19. [19]
    J. H. Wensley, L. Lamport, J. Goldberg, M.W. Green, K.N. Lewitt, P.M. Melliar-Smith, R.E. Shostak, C.B. Weinstock, “SIFT: design and analysis of a fault-tolerant computer for aircraft control”, Proc. of the IEEE, Vol. 66, n° 10, October 1978, pp. 1240–1255.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag/Wien 1991

Authors and Affiliations

  • Jean-Michel Fray
    • 1
  • Jean-Charles Fabre
    • 1
  1. 1.Laboratoire d’Automatique et d’Analyse des Systèmes du C.N.R.S.Toulouse CedexFrance

Personalised recommendations