Abstract — This paper presents the evaluation results of the commercialization of High Security Disaster Recovery Technology (HS-DRT) that uses network distribution and high-speed strong cipher technologies to realize efficient and secure network services. We have commercialized a disaster recovery system and evaluated the performance of the distributed engines using the hash functions, versatile spatial scrambling functions, etc., in cloud computing environments. The average processing time has been estimated in terms of the method of implementation of the engine. As for practical network applications, an automatic back-up system using an FTP server has been introduced. We have developed on-premise systems which achieve high security through the use of HS-DRT. Finally, we also propose future technologies for preventing an insider attack. Keywords-disaster recovery; backup; distributed processing; cloud; strong cipher. I. INTRODUCTION Innovative network technology, which can guarantee, as far as possible, the security of users’ or institutes' massive files of important data from any risks such as an unexpected natural disaster, a cyber attack, etc., are becoming increasingly indispensable day by day. As a means of satisfying this need, cloud computing technology is expected to provide an effective and economical backup system by making use of a very large number of data stores and processing resources which are not fully utilized. It is expected that this file data backup mechanism will be utilized by government and municipal offices, hospitals, insurance companies, etc., to guard against the occurrence of unexpected disasters such as earthquakes, large fires and storms and Tsunamis. To achieve secure back up, there is an indispensable need for prompt restoration, which may make versatile use of cellular phones, smart phones, digital signage equipment and PCs, in addition to cloud resources dispersed in multiple geographical locations. In addition to these factors, many companies and individuals involved in industry and commerce are interested in making use of public or private cloud computing facilities, provided by carriers or computer vendors as a means of achieving security and low maintenance and operation costs. In this paper we present the results of an evaluation of an innovative file backup network service, which makes use of an effective ultra-widely distributed data transfer mechanism and a high-speed strong cipher technology to realize efficient, safe data backup at an affordable maintenance and operation cost [1-6]. When a block cipher is used, the required processor and memory costs increase in an exponential manner with increasing data volume. However, with a stream cipher, the input data is simply operated on bit-by-bit, using a simple arithmetic operation, and high-speed processing becomes feasible. This is the fundamental difference between the two cipher technologies. It is possible to combine the use of technologies, specifically, the spatial scrambling of all data files, the random fragmentation of the data files, and the corresponding encryption and replication of each file fragment using a stream cipher. Figure 1 shows the concept of the proposed network service compared with a conventional back up system using the leased lines. In the data center, it is appropriate to introduce a secret sharing scheme for sending “encryption metadata” to the supervisory servers deployed in the several different locations for deciphering the original file data. To enhance security it is better to send the metadata using a Virtual Private Network(VPN). This mechanism make it quite difficult to find out any series in the “encryption metadata” itself. From a disaster recovery point of view, a secret sharing scheme with some appropriate “thresholds” should be introduced in the proposed system. If the system uses a (3,5)-threshold scheme, the system uses five supervisory servers, and can tolerate the simultaneous failure of two servers. On the other hand, from a cyber terrorism point of
An innovative IP router architecture from the viewpoint of minimum switching delay, switching capacity, QoS assurance for the next generation Internet services is proposed. We examined the IP router performance using superconductor device simulator. For the evaluation of a novel IP switch architecture, we effectively apply the SFQ circuits using Josephson junctions to an extremely restricted function block in the switching node and a conventional semiconductor technology is also applied for the rest parts of the other function blocks inside it. We designed frame compression circuits and investigated their behavior by computer simulation using "WinS". We assumed the NEC's standard fabrication process of Nb junction LSI. The simulation results show that the bias current margin of the input shift register, and control circuit is plusmn55%, and plusmn33%, respectively. We also confirmed in the simulation that these circuits could be properly operated up to the clock frequency of 22 GHz
With Bitcoin, the legitimacy of a block of transaction data is verified by randomly selected nodes (hereinafter, verifiers) and notified to all nodes. To ensure the random selection of the verifier of each block, Proof of Works (PoW) is used. However, there is a serious problem with PoW, in that the amount of computation becomes huge. Although Proof of Stake (PoS) has been proposed to reduce the amount of computation, there remains the problem that if there is collusion among nodes, it is possible to control the probability of being the verifier. In this paper, a novel technique, Proof-of-Lucky-ID (PoL), is proposed. PoL is a kind of lottery that guarantees the randomness of the selection of the verifier, even if the node is collaborating unfairly, by using multiple digital signatures created by other nodes as input. Since this technique can determine the verifier with about two hash calculations per node, it significantly reduces the amount of processing compared with PoW, which requires more than 10 ^ 19 hash calculations as of 2017. In addition, since the input value cannot be controlled even if there is node collusion, it is impossible to control the probability of a win. Furthermore, compared to PoW and PoS, the certainty of consensus can be estimated with high accuracy in a short time. Numerical calculations show that both the randomness of verifier selection by the proposed method and the accuracy of the certainty of consensus range estimation are sufficiently high.
Conventional e-mail systems are vulnerable to eavesdropping in the network due to the condition that each email path is established based on a point-to-point protocol. This means that some practical protocols to strengthen security should be introduced. From this viewpoint, we propose the utilization of multiple e-mail accounts and multiple Wi-Fi channels based on HS-DRT technology. This will enable high-speed encryption and a high level of security. Utilizing HS-DRT for e-mail communication makes it possible to automatically disperse and send the encrypted fragments over multiple different paths to the destination user. It makes it impossible for a third party to decipher the original e-mail message even if there are continuous attempts to eavesdrop the same message. In the performance evaluation, we compare the performance of the proposed mail system with that of a conventional system by examining it in a large number of multi-account environments. We also evaluate the processing time needed to encrypt each fragment and possible transmission time intervals.