Skip to main content
Log in

Study on security enhancement technology for disaster tolerant system

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

This paper proposes a security enhancement scheme for disaster tolerant system based on trusted computing technology which combines with the idea of distributed threshold storage. This scheme takes advantage of trusted computing platform with trusted computing module, which is provided with such excellent features as security storage, remote attestation, and so on. Those features effectively ensure trustworthiness of disaster tolerant point. Furthermore, distributed storage based on Erasure code not only disposes the storage problem about a great deal of data, but also preferably avoids one node invalidation, alleviates network load and deals with joint cheat and many other security problems. Consequently, those security enhancement technologies provide mass data with global security protection during the course of disaster tolerance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Lawler CM, Harper M A, Thornton M A. Components and Analysis of Disaster Tolerant Computing [C] // IEEE International Performance Computing and Communications Conference(IPCCC 2007). New York: IEEE Press, 2007: 380–386.

    Google Scholar 

  2. Peng Rong, Cui Jingsong. Distributed Secure File System Based on Error Correcting Code [J]. Computer Engineering, 2005, 31(7): 7–8 (Ch).

    Google Scholar 

  3. Pitcher C, Riely J. Dynamic Policy Discovery with Remote Attestation [J]. Lecture Notes in Computer Science (LNCS), 2006, 3921: 111–125.

  4. Burrows M, Abadi M, Needham R. A Logic of Authentication [J]. Operating System Review, 1989, 23(5): 1–13.

    Article  Google Scholar 

  5. Miller S P, Neuman B C, Schiller J I, et al. Kerberos Authentication and Authorization System [R]. Cambridge: Massachusetts Institute of Technology. Project Athena Technical Plan OWL Section E.2.1, 1988.

    Google Scholar 

  6. Trusted Computing Group. TCG Trusted Network Connect Architecture for Interoperability V1.2 [EB/OL]. [2007-05-20]. https://www. trustedcomputing -group.org/groups/network.

  7. Shamir A. How to Share a Secret [J]. Communications of the ACM(CACM), 1979, 22(11): 612–613.

    Article  MATH  MathSciNet  Google Scholar 

  8. Blakley G R. Safeguarding Cryptographic Keys [C] // The AFIPS National Computer Conference. New York: American Federation of Information Processing Societies Press, 1979: 313–317.

    Google Scholar 

  9. Feldman P. A Practical Scheme for Non-Interactive Verifiable Secret Sharing [C] // The 28th IEEE Annual Symposium on Foundations of Computer Science. Oakland: IEEE Computer Society, 1987: 427–437.

    Google Scholar 

  10. Laih C S, Harn L, Lee J Y, et a1. Dynamic Threshold Scheme Based on the Definition of Cross-Product in a N-Dimensional Liner Space[J]. Lecture Notes in Computer Science (LNCS), 1990, 435: 286–298.

  11. Zhang Futai, Zhao Fuxiang, Wang Yumin. Verifiable Secret Sharing and Its Applications [J]. Chinese Journal of Electronics, 2002, 30(10): 1519–1525(Ch).

    Google Scholar 

  12. Huang Dongping, Wang Huayong, Huang Liansheng, et al. Dynamic Threshold Secret Sharing Scheme [J]. Journal of Tsinghua University (Science and Technology), 2006, 46(1): 102–105(Ch).

    MATH  MathSciNet  Google Scholar 

  13. Mu Jianjun, Lu Chengye, Wang Xinmei. Research and Development on Erasure Codes [J]. Journal of Electronics and Information Technology, 2002, 24(9): 1276–1281.

    Google Scholar 

  14. Deswarte Y, Fabre J C, Fray J M, et al. SATURNE: A Distributed Computing System which Tolerates Faults and Intrusions[C] //Workshop on Future Trends of Distributed Computing Systems in the 1990s.Washington D C: IEEE Computer Society Press, 1988: 329–338.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lina Wang.

Additional information

Foundation Items: Supported by the National High Technology Research and Development Program of China (863 Program) (2008AA01Z404), the Science and Technical Key Project of Ministry of Education (108087) and the Scientific and Technological Project of Wuhan City (200810321130)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yu, R., Wang, L., Wang, D. et al. Study on security enhancement technology for disaster tolerant system. Wuhan Univ. J. Nat. Sci. 14, 19–23 (2009). https://doi.org/10.1007/s11859-009-0105-0

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-009-0105-0

Key words

CLC number

Navigation