2015 31st Symposium on Mass Storage Systems and Technologies (MSST) 2015
DOI: 10.1109/msst.2015.7208296
|View full text |Cite
|
Sign up to set email alerts
|

Percival: A searchable secret-split datastore

Abstract: Abstract-Maintaining information privacy is challenging when sharing data across a distributed long-term datastore. In such applications, secret splitting the data across independent sites has been shown to be a superior alternative to fixed-key encryption; it improves reliability, reduces the risk of insider threat, and removes the issues surrounding key management. However, the inherent security of such a datastore normally precludes it from being directly searched without reassembling the data; this, howeve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Losing the index to an attacker does not compromise data of other users. Percival [2], a query-based system provides us with a subset of relevant shares within a secret-split datastore. While these systems differ in the way that they split data across multiple archives, our techniques for rebuilding data can work with any of them, as well as other systems that distribute data across multiple systems such as SafeStore [19].…”
Section: Systems Using Information Dispersalmentioning
confidence: 99%
See 1 more Smart Citation
“…Losing the index to an attacker does not compromise data of other users. Percival [2], a query-based system provides us with a subset of relevant shares within a secret-split datastore. While these systems differ in the way that they split data across multiple archives, our techniques for rebuilding data can work with any of them, as well as other systems that distribute data across multiple systems such as SafeStore [19].…”
Section: Systems Using Information Dispersalmentioning
confidence: 99%
“…Under this approach, data is split into n chunks so that at least m ≤ n of them are required to rebuild the original data, often using techniques based on Shamir's secret-splitting [1]. The chunks are then distributed across n administratively-isolated servers, ensuring both the reliability and availability of the data while also protecting it from internal attacks [2], [3].…”
Section: Introductionmentioning
confidence: 99%
“…Percival [89] and Potshards [250] are two systems relying on secret-splitting techniques. The latter offers long-term security by using two levels of secret splitting and placement.…”
Section: Censorship Resistancementioning
confidence: 99%