Knowledge (XXG)

Cryptographic splitting

Source 📝

19:, also known as cryptographic bit splitting or cryptographic data splitting, is a technique for securing data over a computer network. The technique involves encrypting data, splitting the encrypted data into smaller data units, distributing those smaller units to different storage locations, and then further encrypting the data at its new location. With this process, the data is protected from security breaches, because even if an intruder is able to retrieve and decrypt one data unit, the information would be useless unless it can be combined with decrypted data units from the other locations. 88:
The technology has also been written about in the context of more effectively using sensitive corporate information, by entrusting different individuals within a company (trustees) with different parts of the information.
210: 145: 169:
Balasaraswathi v.r; Manikandan s (2015-01-26). "Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach".
35:
Cryptographic splitting utilizes a combination of different algorithms to provide the data protection. A block of data is first encrypted using the
186: 78:. By splitting the data into different parts of the storage area network, this technique provided data redundancy in addition to security. 67:
for additional security. Security vendor Security First Corp uses this technology for its Secure Parser Extended (SPx) product line.
63:. The encrypted data subsets can be stored on different clouds, with the information required to restore the data being held on a 271: 40: 231:
Ogiela, Lidia (April 2015). "Advanced techniques for knowledge management and access to strategic information".
39:
government encryption standard. The encrypted bits are then split into different shares and then each share is
44: 276: 27:
The technology was filed for patent consideration in June 2003, and the patent was granted in June 2008.
75: 248: 192: 171:
2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies
182: 85:
has written about using the technology as part of its Cloud Data Encryption Services (ICDES).
240: 174: 60: 98: 265: 64: 252: 244: 196: 178: 120: 48: 36: 59:
One application of cryptographic splitting is to provide security for
71: 121:"United States Patent 7391865: Secure data parser method and system" 82: 74:
gave a presentation about using cryptographic splitting with
146:"Storage Security Using Cryptographic Splitting" 233:International Journal of Information Management 8: 139: 137: 115: 113: 109: 70:In 2009, technology services company 7: 123:. freepatentsonline.com. 2008-06-24 14: 211:"Cloud computing news: Security" 173:. ieee.org. pp. 1190–1194. 245:10.1016/j.ijinfomgt.2014.11.006 1: 179:10.1109/ICACCCT.2014.7019286 293: 45:National Security Agency 17:Cryptographic splitting 272:Information governance 213:. ibm.com. 2015-10-21 76:storage area networks 188:978-1-4799-3914-5 284: 257: 256: 228: 222: 221: 219: 218: 207: 201: 200: 166: 160: 159: 157: 156: 150: 144:Dodgson, David. 141: 132: 131: 129: 128: 117: 292: 291: 287: 286: 285: 283: 282: 281: 262: 261: 260: 230: 229: 225: 216: 214: 209: 208: 204: 189: 168: 167: 163: 154: 152: 148: 143: 142: 135: 126: 124: 119: 118: 111: 107: 95: 81:Computer giant 61:cloud computing 57: 33: 25: 12: 11: 5: 290: 288: 280: 279: 274: 264: 263: 259: 258: 239:(2): 154–159. 223: 202: 187: 161: 133: 108: 106: 103: 102: 101: 99:Secret sharing 94: 91: 56: 53: 32: 29: 24: 21: 13: 10: 9: 6: 4: 3: 2: 289: 278: 277:Data security 275: 273: 270: 269: 267: 254: 250: 246: 242: 238: 234: 227: 224: 212: 206: 203: 198: 194: 190: 184: 180: 176: 172: 165: 162: 147: 140: 138: 134: 122: 116: 114: 110: 104: 100: 97: 96: 92: 90: 86: 84: 79: 77: 73: 68: 66: 65:private cloud 62: 54: 52: 50: 46: 42: 38: 30: 28: 22: 20: 18: 236: 232: 226: 215:. Retrieved 205: 170: 164: 153:. Retrieved 125:. Retrieved 87: 80: 69: 58: 55:Applications 34: 26: 16: 15: 51:algorithm. 266:Categories 217:2016-09-23 155:2016-09-23 151:. snia.org 127:2016-09-23 105:References 43:using the 31:Technology 253:17463367 197:16542768 93:See also 49:SHA-256 37:AES-256 23:History 251:  195:  185:  72:Unisys 41:hashed 249:S2CID 193:S2CID 149:(PDF) 183:ISBN 241:doi 175:doi 83:IBM 47:'s 268:: 247:. 237:35 235:. 191:. 181:. 136:^ 112:^ 255:. 243:: 220:. 199:. 177:: 158:. 130:.

Index

AES-256
hashed
National Security Agency
SHA-256
cloud computing
private cloud
Unisys
storage area networks
IBM
Secret sharing


"United States Patent 7391865: Secure data parser method and system"


"Storage Security Using Cryptographic Splitting"
doi
10.1109/ICACCCT.2014.7019286
ISBN
978-1-4799-3914-5
S2CID
16542768
"Cloud computing news: Security"
doi
10.1016/j.ijinfomgt.2014.11.006
S2CID
17463367
Categories
Information governance
Data security

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.