Title :
On the Optimal Placement of Secure Data Objects over Internet
Author :
Tu, Manghui ; Li, Peng ; Ma, Qingkai ; Yen, I-Ling ; Bastani, Farokh B.
Author_Institution :
Dept. of Comput. Sci., Texas Univ., Dallas, TX, USA
Abstract :
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changing the number of shares in secret sharing schemes can be costly. To achieve performance goals in data accesses, secret sharing can be combined with dynamic replication in a distributed system with varying client access patterns. In this paper, we investigate the problem of optimal allocation of secure data objects that are secret shared and possibly replicated. The system topology we consider consists of two layers. In the upper layer, multiple clusters form a network topology that can be represented by a general graph. The nodes within each cluster also have a topology represented by a general graph. We decompose the share replica allocation problem into two sub-problems, the resident set problem which allocates a subset of shares to clusters, and the -intra-cluster allocation problem which determines the number of share replicas to be allocated and their placements. We develop two different heuristic algorithms for the two sub-problems. The algorithm for the optimal resident set problem has a time complexity of O(n^2 ). An O(n^3 ) algorithm is presented for the intra-cluster allocation problem.
Keywords :
Internet; computational complexity; cryptography; data integrity; replicated databases; resource allocation; Internet; data availability; data confidentiality; data integrity; heuristic algorithm; intra-cluster allocation problem; intrusion tolerance; replicated file system; resident set problem; secret sharing scheme; secure data object; share replica allocation problem; system topology; time complexity; Clustering algorithms; Costs; Cryptography; Data security; Information security; Internet; Intrusion detection; Network topology; Protection; Scattering;
Conference_Titel :
Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International
Print_ISBN :
0-7695-2312-9
DOI :
10.1109/IPDPS.2005.306