19:, also known as cryptographic bit splitting or cryptographic data splitting, is a technique for securing data over a computer network. The technique involves encrypting data, splitting the encrypted data into smaller data units, distributing those smaller units to different storage locations, and then further encrypting the data at its new location. With this process, the data is protected from security breaches, because even if an intruder is able to retrieve and decrypt one data unit, the information would be useless unless it can be combined with decrypted data units from the other locations.
88:
The technology has also been written about in the context of more effectively using sensitive corporate information, by entrusting different individuals within a company (trustees) with different parts of the information.
210:
145:
169:
Balasaraswathi v.r; Manikandan s (2015-01-26). "Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach".
35:
Cryptographic splitting utilizes a combination of different algorithms to provide the data protection. A block of data is first encrypted using the
186:
78:. By splitting the data into different parts of the storage area network, this technique provided data redundancy in addition to security.
67:
for additional security. Security vendor
Security First Corp uses this technology for its Secure Parser Extended (SPx) product line.
63:. The encrypted data subsets can be stored on different clouds, with the information required to restore the data being held on a
271:
40:
231:
Ogiela, Lidia (April 2015). "Advanced techniques for knowledge management and access to strategic information".
39:
government encryption standard. The encrypted bits are then split into different shares and then each share is
44:
276:
27:
The technology was filed for patent consideration in June 2003, and the patent was granted in June 2008.
75:
248:
192:
171:
2014 IEEE International
Conference on Advanced Communications, Control and Computing Technologies
182:
85:
has written about using the technology as part of its Cloud Data
Encryption Services (ICDES).
240:
174:
60:
98:
265:
64:
252:
244:
196:
178:
120:
48:
36:
59:
One application of cryptographic splitting is to provide security for
71:
121:"United States Patent 7391865: Secure data parser method and system"
82:
74:
gave a presentation about using cryptographic splitting with
146:"Storage Security Using Cryptographic Splitting"
233:International Journal of Information Management
8:
139:
137:
115:
113:
109:
70:In 2009, technology services company
7:
123:. freepatentsonline.com. 2008-06-24
14:
211:"Cloud computing news: Security"
173:. ieee.org. pp. 1190–1194.
245:10.1016/j.ijinfomgt.2014.11.006
1:
179:10.1109/ICACCCT.2014.7019286
293:
45:National Security Agency
17:Cryptographic splitting
272:Information governance
213:. ibm.com. 2015-10-21
76:storage area networks
188:978-1-4799-3914-5
284:
257:
256:
228:
222:
221:
219:
218:
207:
201:
200:
166:
160:
159:
157:
156:
150:
144:Dodgson, David.
141:
132:
131:
129:
128:
117:
292:
291:
287:
286:
285:
283:
282:
281:
262:
261:
260:
230:
229:
225:
216:
214:
209:
208:
204:
189:
168:
167:
163:
154:
152:
148:
143:
142:
135:
126:
124:
119:
118:
111:
107:
95:
81:Computer giant
61:cloud computing
57:
33:
25:
12:
11:
5:
290:
288:
280:
279:
274:
264:
263:
259:
258:
239:(2): 154–159.
223:
202:
187:
161:
133:
108:
106:
103:
102:
101:
99:Secret sharing
94:
91:
56:
53:
32:
29:
24:
21:
13:
10:
9:
6:
4:
3:
2:
289:
278:
277:Data security
275:
273:
270:
269:
267:
254:
250:
246:
242:
238:
234:
227:
224:
212:
206:
203:
198:
194:
190:
184:
180:
176:
172:
165:
162:
147:
140:
138:
134:
122:
116:
114:
110:
104:
100:
97:
96:
92:
90:
86:
84:
79:
77:
73:
68:
66:
65:private cloud
62:
54:
52:
50:
46:
42:
38:
30:
28:
22:
20:
18:
236:
232:
226:
215:. Retrieved
205:
170:
164:
153:. Retrieved
125:. Retrieved
87:
80:
69:
58:
55:Applications
34:
26:
16:
15:
51:algorithm.
266:Categories
217:2016-09-23
155:2016-09-23
151:. snia.org
127:2016-09-23
105:References
43:using the
31:Technology
253:17463367
197:16542768
93:See also
49:SHA-256
37:AES-256
23:History
251:
195:
185:
72:Unisys
41:hashed
249:S2CID
193:S2CID
149:(PDF)
183:ISBN
241:doi
175:doi
83:IBM
47:'s
268::
247:.
237:35
235:.
191:.
181:.
136:^
112:^
255:.
243::
220:.
199:.
177::
158:.
130:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.