Browse Prior Art Database

A Method and System for Combining Data Slices for Enhanced Security

IP.com Disclosure Number: IPCOM000247824D
Publication Date: 2016-Oct-06
Document File: 1 page(s) / 20K

Publishing Venue

The IP.com Prior Art Database

Abstract

A method and system is disclosed for combining data slices for enhanced security. The method and system utilizes a concept of stenography to encode data sources stored in a Data Source Name (DSN) memory.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 1

A Method and System for Combining Data Slices for Enhanced Security

Disclosed is a method and system for combining data slices for enhanced security. The method and system utilizes a concept of stenography to encode data sources stored in a Data Source Name (DSN) memory.

The method and system selects a data source 'X' which can be appeared altogether as a different data source 'Y'. Subsequently, the method and system computes a "difference function" between the data source X and the data source Y to produce a new data source D. For instance, the "difference function" between the data source X and the data source Y can be computed by using a bitwise XOR of the data source X and the data source Y, or by computing the modular subtraction or addition of the data source X and the data source Y. Further, the method and system enables a user to select other data source from 0 to N, which is not modified and stored in the DSN memory and is defined as "masking sources". Later, the difference function D and each of the selected "masking sources" is applied to produce a "masked difference" M. For instance, if there are 0 additional masking sources, then the masked difference M is equal to the difference function D (M=D). Additionally, the method and system encodes error and disperses both the data source Y and data source M to the DSN memory.

In accordance with an embodiment, if an adversary gains an access to the DSN memory, the adversary may notice an encrypted data among the data sources along with the masked differen...