SlideShare a Scribd company logo
TELKOMNIKA Telecommunication Computing Electronics and Control
Vol. 21, No. 5, October 2023, pp. 1030~1038
ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v21i5.25305  1030
Journal homepage: http://telkomnika.uad.ac.id
Fault-tolerant backup storage system for confidential data in
distributed servers
Olzhas Tasmagambetov, Yerzhan Seitkulov, Ruslan Ospanov, Banu Yergaliyeva
Department of Information Security, L. N. Gumilyov Eurasian National University, Astana, Kazakhstan
Article Info ABSTRACT
Article history:
Received May 08, 2023
Revised Jun 05, 2023
Accepted Jun 06, 2023
This article addresses the critical issue of securing backup storage for
confidential data, a key concern in safeguarding the operations of critical
information systems dealing with extensive amounts of sensitive
information. The study proposes a novel cryptographic fault-tolerant backup
storage system for confidential data, leveraging cryptographic algorithms
and protocols. These protocols enable message encryption, ensuring
decryption is only possible after a specified time period. The proposed
system combines various distributed key generation protocols, proactive
secret sharing protocols, asymmetric encryption algorithms, and digital
signature algorithms. By employing such cryptographic protocols,
it becomes feasible to develop and implement a robust, fault-tolerant service
for backing up confidential data.
Keywords:
Backup storage
Cryptographic algorithms
Elliptic curve cryptography
Information security
System fault tolerance This is an open access article under the CC BY-SA license.
Corresponding Author:
Yerzhan Seitkulov
Department of Information Security, L. N. Gumilyov Eurasian National University
Astana, Kazakhstan
Email: yerzhan.seitkulov@gmail.com
1. INTRODUCTION
This study focuses on addressing the security concerns associated with backing up confidential data.
It is an essential issue in maintaining the security of critical information systems that handle substantial
volumes of sensitive information. Specifically, the practical methods and protocols developed in this work
aim to facilitate the creation of a model for a fault-tolerant information storage service operating within
specified time constraints. Requirements for methods of ensuring the availability and fault tolerance of
information resources, hardware for processing and storing data are established for providing information
security during maintenance of informatization objects [1]-[4]. At the same time, for this, the owners ensure
the availability of a backup server room, data servers, data storage systems and data transmission channels.
Depending on the class of data criticality and computing resources, deployment of a mirror-loaded hot “clone”
of servers in a backup server room, an unloaded cold backup and storage of spare sets of server equipment and
data storage systems, as well as copies of the information resources themselves, should be provided. In addition,
redundancy of the life support systems of servers and the server room (guaranteed power supply (UPS, diesel
generator sets)) and grounding, air conditioning and ventilation systems, gas fire extinguishing and access
control independent of the fire safety systems of the building, as well as raised floors (to counteract flooding) is
provided. Also, for critical data of a fault tolerance class with a utilization rate of at least 98.7 percent
approaches to decomposition, their isolation, compatibility are used. In approaches to decomposition, computing
resources are distributed between virtual machines. In approaches to their isolation, the crash of one of them does
not affect the others. In approaches to compatibility, the software can run on standardized operating platforms.
The above is associated with the requirements to exclude a single point of failure at the logical and physical
levels of server hardware, software, separation of computing resources at the hardware and software levels.
TELKOMNIKA Telecommun Comput El Control 
Fault-tolerant backup storage system for confidential data in distributed servers (Olzhas Tasmagambetov)
1031
Fault tolerance in accordance with uniform requirements is also implemented by organizational measures by
developing procedures for recovering from failures and failures of servers and software, ensuring the safety
of virtual machine images, and storing spare parts in close proximity to server rooms. To achieve reliability
indicators of placement inside server rooms in critical informatization objects, methods of equipment location
are used to reduce the risks of threats. At the same time, one of the aspects of the fault-tolerant use of
information resources is the backup storage of a complete copy of archived data.
The daily operational activities of an employee using personal computers and information systems
in state bodies are associated with the creation of various kinds of information necessary for decision-making
and the provision of public services. The specified data and documents in electronic digital form may be with
different levels of relevance to the solution of various kinds of tasks, but may be necessary in the future for
the employee. Therefore, in the information and analytical activities of a civil servant, various kinds of
“drafts”, “document templates”, saved responses to requests, extracts from legal acts that are not subject to
accounting or do not meet the selection criteria for inclusion in the centralized information resources of the
unit or archives. It should be noted that some part of the electronic information stored on computers contains
personal data of citizens or other confidential information. In this regard, it can be assumed that such
documents in each subdivision of the state body are stored on computer equipment, the circulation of which
cannot be controlled, are of interest to intruders, and the loss of which can cause certain damage and paralyze
the activities of the state body. In this light, the most secure model is the storage and processing of
confidential data using a decentralized architecture in which concentration, processing and storage, as well as
guaranteed destruction, are carried out according to certain protocols [5]-[7].
In this paper, we consider a model of functioning of a fault-tolerant backup storage system of protected
information during a specific period using encryption techniques within a secure cryptographic framework
named as elliptic curve time-lapse cryptography (ECTLC). The procedure relies on time-lapse cryptography
(TLC) [8], [9], which establishes a cryptographic protocol for encrypting client data in a manner that ensures
decryption cannot occur before a specific designated time, regardless of whether the sender desires it. TLC
incorporates the Pedersen’s distributed key generation (DKG) protocol, the Feldman’s threshold verifiable
secret sharing (VSS) protocol, and the ElGamal encryption. The agreed-upon parameters of the ElGamal
encryption algorithm, including a prime number 𝑝 that generates a prime order element 𝑔, are utilized by TLC.
These parameters can be found, for example, in request for comments (RFC) 3526 and RFC 5114. ECTLC
employs analogous algorithms found in elliptic curve cryptography. More precisely, it employs a DKG
protocol that is dependent on the discrete logarithm problem on elliptic curves, the Pedersen’s threshold VSS
protocol, and the ElGamal encryption that is specifically tailored for elliptic curves (ECs). In this paper we
propose new cryptographic fault-tolerant backup storage system of confidential data based on above
mentioned cryptographic algorithms and protocols. It is different from Yergaliyeva et al. [10] where
Shamir’s secret sharing technology and Diffie-Hellman protocol on an elliptic curve were used. Furthermore,
there exists the potential to incorporate novel and enhanced algorithms into the protocol, which can offer
increased efficiency and expanded functionality. Specifically, to guarantee data encryption over an extended
duration, the proactive secret sharing protocol, as outlined in Sun et al. [11], can be employed.
2. METHOD
Now we consider the model of functioning of a fault-tolerant backup storage system of protected
information during a specific period. The parties included in the suggested model consist of:
a) The portal (𝑃𝑟) responsible for receiving applications from clients to store confidential information.
b) The client (𝐶𝑙) is a party who utilizes the portal as a user.
c) The service (𝑆𝑟) – it consists of 𝑛 distributed servers that are geographically separated from one
another, error-free and secretly performing calculations provided by the protocol, securely storing all
their secret data, having a secure method of backing up data for disaster recovery. The assumption is
made that the servers do not engage in collusion, meaning they do not share or transfer confidential data
among themselves. All servers can privately and secretly exchange information with each other,
forming a network. A threshold value 𝑡 is assumed such that at most 𝑡 − 1 servers can break the
protocol and at least 𝑡 servers are reliable. The condition 𝑛 ≥ 2𝑡 − 1 (𝑡 ≤ (𝑛 + 1) 2
⁄ ) must be satisfied,
for example, if 𝑛 = 3, then 𝑡 ≤ 2.
The model provides using the agreed parameters of the used elliptic curve: elliptic curve modulus-prime
number 𝑝, EC equation, coefficients 𝑎 and 𝑏 of this equation from field 𝐹𝑝, EC point 𝐺 of prime order 𝑝.
These settings can be found, for example, at the website of the SafeCurves project [12]. SafeCurves is a project
that aims to provide elliptic-curve cryptography (ECC) security, not just elliptic curve discrete logarithm
problem (ECDLP) security. It provides criteria for choosing curves that keep simple implementations safe.
Efficiency is an important factor in curve selection and most standards prioritize efficiency. However,
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1030-1038
1032
SafeCurves does not prioritize efficiency unless it interacts with security concerns. The SafeCurves website
provides security ratings for various specific curves, some of which have been proposed for deployment or
are currently in use. In the model under consideration, the M-511 elliptic curve can be used with the
following parameters [12].
− The elliptic curve modulus, the prime number
𝑞 = 2511
− 1 =
67039039649712985497870124991029230637396829102961966888617807218608
8201503677348840093714908345171384501592909324302542687694140597328497321682450
3041861.
− The elliptic curve equation
𝑦2
= 𝑥3
+ 530438𝑥2
+ 𝑥𝑚𝑜𝑑𝑞
− The equation coefficients 𝑎 and 𝑏 from the finite field
− 𝐹𝑞: 𝑎 = 530438, 𝑏 = 1
− The base point of prime order 𝑁 on the elliptic curve
𝐺 = (𝑥𝐺, 𝑦𝐺) = (5,
17360859007097926424827522860389970695051812781717659187866778424758212450543074
5177116625808811349787373477), 𝑁 = 2508
1072475475963574762404453151406812184207075662743483302896554080882767
50620 = 83798799562141231872337656238786538296746036378702458610772259023261025
18796074108048767793830555087621410592584974489349870525087756261624609307379422
99.
The M-511 curve satisfies requirements to basic parameters, ECDLP safety requirements and ECC
safety requirements in addition to ECDLP safety. Curve M-511 has a sufficient security level of 2252.3
, and
therefore provides resistance to various attacks [12]. Overview of the model (protocol):
− Step 1: the client performs a typical login procedure on the portal.
− Step 2: the client submits a data encryption request (for a specific message, 𝑚) to 𝑃𝑟.
− Step 3: 𝑃𝑟 forwards the 𝐶𝑙’s request to 𝑆𝑟, including the 𝐶𝑙’s unique ID, the moment of time 𝑇𝐼𝐷 when
the request was dispatched, and the designated moment of time 𝑇𝐼𝐷 + 𝛿𝐼𝐷 by which the 𝐶𝑙’s data should
remain encrypted and inaccessible for decryption. These steps are illustrated in Figure 1.
Figure 1. Steps 1-3
− Step 4: each service server 𝑃𝑖 receives a request.
− Step 5: each server 𝑃𝑖 chooses random values 𝑎𝑖0, 𝑎𝑖1, …, 𝑎𝑖𝑘, 𝑏𝑖0, 𝑏𝑖1, …, 𝑏𝑖𝑘, where 𝑘 = 𝑡 − 1, from
the field 𝐹𝑝 (i.e., 0 ≤ 𝑎𝑖𝑟 < 𝑝, 0 ≤ 𝑏𝑖𝑟 < 𝑝). 𝑎𝑖0 is a part of the private key.
− Step 6: then each server 𝑃𝑖 calculates 𝑠𝑖𝑗 = 𝑎𝑖0 + 𝑎𝑖1𝑗 + 𝑎𝑖2𝑗2
+ ⋯ + 𝑎𝑖𝑘𝑗𝑘(𝑚𝑜𝑑𝑞) and
𝑠′𝑖𝑗 = 𝑏𝑖0 + 𝑏𝑖1𝑗 + 𝑏𝑖2𝑗2
+ ⋯ + 𝑏𝑖𝑘𝑗𝑘(𝑚𝑜𝑑𝑞), where 𝑗 ≠ 𝑖 is a number of the server 𝑃𝑗, 1 ≤ 𝑗 ≤ 𝑛.
− Step 7: then each server 𝑃𝑖 calculates 𝐶𝑖𝑟 = 𝑎𝑖𝑟𝐺 + 𝑏𝑖𝑟𝐺′, 0 ≤ 𝑟 ≤ 𝑘 (here the operations of adding the
points of an elliptic curve and multiplying a point by a number are applied).
− Step 8: then each server 𝑃𝑖 sends 𝑠𝑖𝑗 and 𝑠′𝑖𝑗 to the servers 𝑃𝑗 over private communication channels
between 𝑃𝑖 and 𝑃𝑗, and publicly publishes 𝐶𝑖𝑟 (0 ≤ 𝑟 ≤ 𝑘) with its digital signature 𝑆𝐼𝐺𝑁𝑖.
− Step 9: each server 𝑃𝑖, having received 𝑠𝑗𝑖 and 𝑠′𝑗𝑖 from the servers 𝑃𝑗, 1 ≤ 𝑗 ≤ 𝑛, 𝑗 ≠ 𝑖, checks for
equality 𝑠𝑗𝑖𝐺 + 𝑠′𝑗𝑖𝐺′
= ∑ 𝑖𝑟
𝐶𝑗𝑟
𝑘
𝑟=0 (∗).
If equality (∗) does not hold for values 𝑠𝑗𝑖 and 𝑠′𝑗𝑖 received from the server 𝑃𝑗, then the server 𝑃𝑖 complains
against 𝑃𝑗. If the server 𝑃𝑖 receives a complaint against himself, he publishes 𝑠𝑖𝑗 and 𝑠′𝑖𝑗 with his digital
signature 𝑆𝐼𝐺𝑁𝑖, satisfying the equality (∗).
TELKOMNIKA Telecommun Comput El Control 
Fault-tolerant backup storage system for confidential data in distributed servers (Olzhas Tasmagambetov)
1033
− Step 10: each server 𝑃𝑖 marks as disqualified each server that received more than 𝑘 complaints or
responded to a complaint with values that do not satisfy the equality (∗).
− Step 11: each server 𝑃𝑖 creates a set 𝑄 of all non-disqualified servers. Each server 𝑃𝑖 from the set 𝑄
calculates 𝐴𝑖0 = 𝑎𝑖0𝐺 and publishes 𝐴𝑖0 with its digital signature 𝑆𝐼𝐺𝑁𝑖.
− Step 12: each server 𝑃𝑖 from the set 𝑄 receives 𝐴𝑗0 and calculates the public key 𝑃𝑘𝑖 = ∑ 𝐴𝑗0
𝑗∈𝑄 .
− Step 13: each server 𝑃𝑖 forms the key structure (𝐾𝑆) 𝐾𝐼𝐷 = (𝐼𝐷, 𝑇𝐼𝐷, 𝛿𝐼𝐷, 𝑃𝐾𝐼𝐷 = 𝑃𝑘𝑖) with its digital
signature 𝑆𝐼𝐺𝑁𝑖.
− Step 14: each server 𝑃𝑖 sends the generated 𝐾𝑆 to 𝑃𝑟.
− Step 15: 𝑃𝑟 transmits the received 𝐾𝑆 to 𝐶𝑙. These two steps are illustrated in Figure 2.
Figure 2. Steps 14-15
− Step 16: the client verifies 𝐷𝑆𝑠 𝑆𝐼𝐺𝑁𝑖(𝐾𝐼𝐷) against the published 𝐾𝑆𝑠 𝐾𝐼𝐷, ensuring that they match
and meet the minimum requirements for 𝑡 participants, and also verifies the identity associated with the
key structures.
− Step 17: 𝐶𝑙 generates a symmetric key 𝑠 to encrypt the message 𝑚.
− Step 18: 𝐶𝑙 encrypts the message 𝑚 with the key 𝑠.
− Step 19: 𝐶𝑙 encrypts the symmetric key 𝑠 as follows. The key 𝑠 is placed at the point of the elliptic curve:
a point 𝑀 = (𝑥, 𝑦) is chosen such that the part of the vector 𝑥 is fixed and corresponds to the key 𝑠, and
the vector 𝑦 satisfies the elliptic curve equation for the selected 𝑥, i.e., 𝑦 is the square root modulo 𝑝
(Shanks’ algorithm). A random number 𝑟, 0 < 𝑟 < 𝑞 is chosen. 𝐶1 = 𝑟𝐺: 𝑟𝐺 = 𝐺 + 𝐺 + ⋯ + 𝐺 is
calculated (𝑟 times) (+ is addition operation on an 𝐸𝐶). 𝐶2 = 𝑀 + 𝑟𝑃𝑘 is calculated, where 𝑃𝑘 is the
public key (elliptic curve point). A pair (𝐶1, 𝐶2) is a ciphertext.
− Step 20: the client sends an encrypted message 𝑚 and an encrypted symmetric key 𝑠 to the portal. This
step is illustrated in Figure 3.
Figure 3. Step 20
− Step 21: 𝑃𝑟 securely stores the encrypted data and encrypted key, linking them to the 𝐶𝑙’s ID and other
parameters including the specified time mentioned in the request.
− Step 22: once the designated time specified in the request is reached, or at any point thereafter, 𝑃𝑟 sends
a request to 𝑆𝑟 to obtain a private key, providing the 𝐶𝑙’s ID, public key, and time parameters. This step
is illustrated in Figure 4.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1030-1038
1034
Figure 4. Step 22
− Step 23: every server receives a request and distributes its private key among the other servers.
− Step 24: each server obtains the private keys from the other servers, computes the combined private
key, associates it with the corresponding public key, securely stores it in its database, and transmits the
private key to 𝑃𝑟.
− Step 25: 𝑃𝑟 receives the private key and decrypts the symmetric key using this key as follows. 𝐷𝑘𝐶1 is
calculated where 𝐷𝑘 is private key. −𝐷𝑘𝐶1 is calculated (inverse element for 𝐷𝑘𝐶1). (−𝐷𝑘𝐶1) + 𝐶2 = 𝑀
is calculated.
− Step 26: the portal decrypts the client’s data.
Note: as a component of 𝑆𝑟, it is possible to utilize a small network of managers who operate as a
cohesive management team for overseeing 𝑆𝑟. The primary duty of this team is to generate a schedule of
public keys and corresponding private keys produced by 𝑆𝑟. They also manage an internal bulletin board
exclusively for 𝑆𝑟’s members and maintain an open bulletin board accessible to 𝑆𝑟’s users. Every manager
will keep their individual duplicates of these boards.
The servers and users of the service will examine the messages posted on each copy of the bulletin
board and determine the correct values based on the majority of entries. Each server in the service
accompanies every message with a digital signature. The activities of all participants in the protocol are
synchronized using a public and trusted clock, such as the ones provided by National Institute of Standards
and Technology (NIST). The service has the capability to generate key structures periodically. For example,
it can generate keys with a lifespan of one week every day, or keys with a duration of 4 hours for every interval
of 20 minutes. Such a schedule is posted on the open bulletin board by the managers. Furthermore, 𝑆𝑟 has the
capability to accept user requests for generating new keys with designated durations. The managers receive
these requests and publicly announce them on the open bulletin board. The servers then generate keys in
accordance with the protocol, sign them, and publish the signed 𝐾𝑆s on the open bulletin board. Additionally,
𝑆𝑟 welcomes user requests for generating new keys with specific lifespans. The managers handle these requests
and post them on the open bulletin board. The servers adhere to the protocol to generate keys, sign them, and
make the signed 𝐾𝑆s available on the open bulletin board.
3. RESULTS AND DISCUSSION
The main findings of the study can be summarized as follows. The present study focuses new
cryptographic fault-tolerant backup storage system of confidential data based on TLC, specifically the variant
known as ECTLC. TLC refers to a method of encrypting data or information so that it can only be accessed
or decrypted after a certain amount of time has passed. The time-lapse aspect is used as a security feature to
ensure that the data remains protected until the specified time has elapsed. This technology is used in various
applications, such as secure file storage or information sharing, where it is important to restrict access to
sensitive information until a specified period has passed. The security of information systems created using
time-lapse cryptography refers to the measures taken to protect sensitive and confidential information stored
within these systems from unauthorized access, tampering, and theft. This can include techniques such as
encryption, access control, and secure data storage practices. The goal of these security measures is to
maintain the confidentiality, integrity, and availability of the information stored within the system and
prevent any malicious attacks from compromising it [13]-[16]. The level of security in a time-lapse
cryptography system depends on various factors, such as the complexity of the cryptographic algorithms
used, the robustness of the underlying infrastructure, and the implementation of secure software development
practices [17]-[19].
TELKOMNIKA Telecommun Comput El Control 
Fault-tolerant backup storage system for confidential data in distributed servers (Olzhas Tasmagambetov)
1035
ECTLC is a modification of TLC that is based on elliptic curves. The security of ECTLC is based
on the hardness of the discrete logarithm problem (DLP) over elliptic curves. As long as this problem
remains hard, the encrypted information will be secure against unauthorized access. However, it is crucial to
emphasize that the security of ECTLC is only as strong as the weakest link in the system, and various factors
such as implementation errors, side-channel attacks, or weaknesses in the underlying cryptographic
primitives can affect the overall security of the system. It is important to properly implement and deploy
ECTLC in order to ensure its security. This includes proper selection of cryptographic parameters, secure
implementation of cryptographic primitives, and proper handling of keys and encrypted information.
Additionally, it is important to regularly assess the security of this protocol in light of new developments in
cryptography and computer science to ensure that it continues to provide a high level of security [20]-[22].
The DKG protocol based on the DLP on EC, used in ECTLC, is a cryptographic algorithm for
generating shared secret keys between multiple parties in a secure and efficient manner. The security of such
a protocol relies on the computational hardness of the DLP over EC. In these protocols, each participant
generates a public-private key pair, and the public keys are combined to generate a shared secret key.
The security of the shared secret key relies on the intractability of the DLP over EC. As long as this problem
remains hard, the shared secret key will be secure against unauthorized access.
Pedersen verifiable threshold secret sharing protocol, used in ECTLC, is a cryptographic protocol
for securely sharing a secret among multiple parties in such a way that a threshold of parties must cooperate
to reconstruct the secret. The security of the Pedersen’s threshold VSS protocol relies on the hardness of the
DLP and the computational indistinguishability of the commitment scheme used. In this protocol, a dealer
distributes shares of the secret to each participant, and any threshold number of participants can cooperate to
reconstruct the secret. The protocol also includes a verifiable reconstruction process, in which any participant
can verify the correctness of the reconstructed secret, ensuring that the secret has not been tampered with or
reconstructed incorrectly. The security of the protocol is considered to be strong as long as the underlying
cryptographic assumptions hold.
The ElGamal encryption algorithm on elliptic curves, used in TLC, is a public-key encryption
algorithm that is based on the mathematical problem of computing discrete logarithms over elliptic curves.
The security of ElGamal encryption on elliptic curves is based on the computational hardness of the DLP
over elliptic curves. In the ElGamal encryption algorithm, a sender encrypts a message using the recipient’s
public key, and the recipient can then decrypt the message using their private key. The security of the
encrypted message relies on the intractability of the DLP over elliptic curves, making it computationally
infeasible for an attacker to compute the private key from the public key [23]-[25].
In this model, the client performs a standard login to the portal. This step is a standard login process
that is generally considered secure, provided the portal has implemented secure authentication mechanism.
It is important to ensure that the authentication mechanisms used by the portal are strong enough to prevent
unauthorized access to the system. This may include methods such as multi-factor authentication, strong
password policies, and encryption of sensitive user data. Additionally, within the model, 𝐶𝑙 submits a request
to 𝑃𝑟 to encrypt specific information, denoted as message 𝑚. The security of this step depends on the
encryption algorithm used, as well as the secure transmission of the message to the portal. If the encryption
algorithm used is strong and the transmission of the message is secure (eg., using SSL/TLS), then this step can
be considered secure. In this step, 𝑃𝑟 forwards the 𝐶𝑙’s request to 𝑆𝑟, including essential details such as 𝐶𝑙’s
unique ID, the timestamp of the request, and the designated timeframe during which 𝐶𝑙’s data must remain
encrypted and inaccessible for decryption. The security of this step depends on the security of the transfer of the
request from the portal to the service, as well as the secure storage of metadata by the portal and the service. It is
important to secure the transmission of the request and the secure storage of the metadata.
In addition, the use of a unique customer ID and decryption time limits can help prevent unauthorized access
to customer data. In general, the security of the steps in the considered model depends on various factors,
such as the security of the authentication mechanisms, the strength of the encryption algorithm used, and the
secure transmission and storage of data. It is important to ensure that all these factors are carefully considered
and implemented to ensure the security of the system.
In comparison with other studies, the present study contributes by specifically focusing on the
application of TLC and its variant, ECTLC, based on elliptic curves. While other studies may have explored
different cryptographic methods or variants, this study delves into the security aspects, underlying protocols,
and algorithms specific to ECTLC. The findings of this study have significant implications for the field of
cryptography and information security. TLC, especially ECTLC, offers an additional layer of security by
leveraging the time factor for data access. The use of elliptic curves and the reliance on the hardness of the
DLP provide strong security guarantees, but proper implementation and deployment are crucial for
maintaining the overall security of the system. The DKG protocol and the Pedersen’s threshold VSS protocol
provide secure ways of generating shared secret keys and sharing secrets among multiple parties. These
protocols offer robust security as long as the underlying cryptographic assumptions hold, ensuring that
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1030-1038
1036
sensitive information remains protected and tamper-proof. The ElGamal encryption algorithm on elliptic
curves provides secure communication through public-key encryption. The intractability of the DLP over
ECs ensures the confidentiality of the encrypted messages, protecting them from unauthorized access.
The strengths of this study lie in its focus on time-lapse cryptography, specifically ECTLC, and its detailed
exploration of the underlying protocols and algorithms. The study provides a comprehensive understanding
of the security aspects of ECTLC, including the distributed key generation protocol, the Pedersen’s threshold
VSS protocol, and the ElGamal encryption algorithm.
It is important to note that, as with any cryptographic protocol, the security of these algorithms is only
as strong as the weakest link in the system, and various factors such as implementation errors, side-channel
attacks, or weaknesses in the underlying cryptographic primitives can affect the overall security of the system.
It is important to properly implement and deploy such protocols in order to ensure its security. This includes
proper selection of cryptographic parameters, secure implementation of cryptographic primitives, and proper
handling of keys and encrypted messages. Additionally, it is important to regularly assess the security of this
algorithm in light of new developments in cryptography and computer science to ensure that it continues to
provide a high level of security.
In conclusion, TLC, particularly the variant ECTLC, offers an innovative approach to securing data
and information. The use of elliptic curves and the reliance on the hardness of the DLP provide a strong
foundation for security. However, proper implementation, secure software development practices, and regular
security assessments are essential to maintain the overall security of the system. Recommendations for future
research include conducting empirical studies to evaluate the real-world effectiveness and performance of
ECTLC, including its resistance to potential attacks. Furthermore, staying updated with new developments in
cryptography and computer science is crucial to ensure that ECTLC continues to provide a high level of
security. Additionally, exploring potential applications and use cases for TLC and ECTLC in various domains
can help further understand their practical implications and benefits.
4. CONCLUSION
In this paper, a model of functioning of a fault-tolerant backup data storage system for a given time
is considered. The model is based on the cryptographic encryption protocol for a given time ECTLC.
The protocol effectively combines the DKG protocol that relies on the discrete logarithm on ECs, the
Pedersen’s threshold VSS protocol, an ElGamal encryption on ECs, and an electronic DS. The protocol
permits the usage of predefined parameters, which include the prime number modulus (𝑝) of the EC, the
equation and coefficients (𝑎 and 𝑏) of the EC from the field (𝐹𝑝), and a point (𝐺) on the EC with a prime
order (𝑞) specifically for the ElGamal encryption on EC. A fault-tolerant backup storage system for
confidential data in distributed servers based on ECTLC is a specialized solution designed to provide both
data protection and fault tolerance while incorporating cryptographic techniques that take into account the
passage of time. This type of system utilizes distributed storage architecture, where data is replicated across
multiple servers or nodes. The redundancy ensures that even if one or more servers fail, the confidential data
remains accessible and intact. The distributed nature of the system also enhances fault tolerance and
resilience to hardware failures. By combining fault tolerance mechanisms with ECTLC, the system ensures
the protection and availability of confidential data stored in distributed servers. It addresses potential
hardware failures and provides secure transmission of sensitive information over extended periods, all while
maintaining the confidentiality and integrity of the data.
It is worth noting that further research and evaluation are necessary to assess the efficiency, security,
and effectiveness of the fault-tolerant backup storage system based on time-lapse cryptography. Ongoing
studies can help refine the protocols, algorithms, and parameters used and ensure that the system remains
resistant to known attacks and meets the evolving security requirements for safeguarding confidential data in
distributed environments. Hence, it will be essential to conduct a study in the future to evaluate and choose
the most efficient algorithms and parameters mentioned earlier for the developed protocol. The ECTLC
protocol, which is derived from TLC, presents a solution for transmitting confidential messages to future
recipients. However, instead of the distributed key generation, verifiable thresholding, and encryption
algorithms used in TLC, algorithms based on elliptic curve cryptography are used, which suggests greater
efficiency. At the same time, it is assumed that these changes do not affect the resistance to known attacks.
ACKNOWLEDGEMENTS
This work is supported by the SC of the MSHE of the Republic of Kazakhstan, grant No. AP14869013.
TELKOMNIKA Telecommun Comput El Control 
Fault-tolerant backup storage system for confidential data in distributed servers (Olzhas Tasmagambetov)
1037
REFERENCES
[1] D. Arivudainambi and K. A. V. Kumar, “Performance analysis of security framework for software defined network architectures,”
International Journal of Advances in Applied Sciences (IJAAS), vol. 8, no. 3, pp. 232-242, 2019, doi: 10.11591/ijaas.v8.i3.pp232-242.
[2] W. Hassan, T. -S. Chou, X. Li, P. A. -Kubi, and T. Omar, “Latest trends, challenges and solutions in security in the era of cloud
computing and software defined networks,” The International Journal of Informatics and Communication Technology (IJ-ICT),
vol. 8, no. 3, pp. 162-183, 2019, doi: 10.11591/ijict.v8i3.pp162-183.
[3] H. J. Muhasin, A. Y. Gheni, and H. A. Yousif, “Proposed model for data protection in information systems of government
institutions,” Bulletin of Electrical Engineering and Informatics, vol. 11, no. 3, pp. 1715-1722, 2022,
doi: 10.11591/eei.v11i3.3727.
[4] L. Hoti, K. Dermaku, S. Klaiqi, and H. Dermaku, “Protection and Exchange of Personal Data on the Web in the Registry of Civil
Status,” Emerging Science Journal, vol. 7, no. 1, 2023, doi: 10.28991/ESJ-2023-07-01-03.
[5] O. Farion, A. Balendr, O. Androshchuk, A. Mostovyi, and V. Grinchenko, “Methods of Extraction and Analysis of Intelligence to
Combat Threats of Organized Crime at the Border,” Journal of Human, Earth, and Future, vol. 3, no. 3, 2022,
doi: 10.28991/HEF-2022-03-03-07.
[6] M. Riasetiawan and A. Ashari, “A Proposed Framework of Knowledge Management for COVID-19 Mitigation based on Big
Data Analytic,” Emerging Science Journal, vol. 7, 2023, doi: 10.28991/ESJ-2023-SPER-015.
[7] Z. D. Abbass, J. S. Maatooq, and M. M. Al-Mukhtar, “Monitoring and Modelling Morphological Changes in Rivers Using RS and
GIS Techniques,” Civil Engineering Journal, vol. 9, no. 3, 2023, doi: 10.28991/CEJ-2023-09-03-03.
[8] M. O. Rabin and C. A. Thorpe, “Method and apparatus for time-lapse cryptography,” U.S. Patent, 2007. [Online]. Available:
https://patents.google.com/patent/US8526621B2/en
[9] M. O. Rabin, and C. A. Thorpe, “Time-lapse cryptography,” Technical report TR-22-06, 2006. [Online]. Available:
https://dash.harvard.edu/handle/1/26506434
[10] B. Yergaliyeva, Y. Seitkulov, D. Satybaldina, and R. Ospanov, “On some methods of storing data in the cloud for a given time,”
Telecommunication, Computing, Electronics and Control (TELKOMNIKA), vol. 20, no. 2, pp. 366-372, 2022,
doi: 10.12928/TELKOMNIKA.v20i2.21887.
[11] H. Sun, X. Zheng, and Y. Yu, “A Proactive Secret Sharing Scheme Based on Elliptic Curve Cryptography,” 2009 First
International Workshop on Education Technology and Computer Science, 2009, pp. 666-669, doi: 10.1109/ETCS.2009.408.
[12] D. J. Bernstein and T. Lange, “SafeCurves: choosing safe curves for elliptic-curve cryptography,” SafeCurves. [Online].
Available: https://cr.yp.to/talks/2014.01.18/slides-dan+tanja-20140118-a4.pdf
[13] S. K. Ibrahim and S. A. Abdulhussien, “Improved storage area network method for backup approach,” Indonesian Journal of
Electrical Engineering and Computer Science, vol. 17, no. 3, pp. 1493-1498, 2020, doi: 10.11591/ijeecs.v17.i3.pp1493-1498.
[14] I. M. Sukarsa, I. K. A. M. Antara, P. W. Buana, I. P. A. Bayupati, N. W. Wisswani, and D. W. Puteri, “Data storage model in low-
cost mobile applications,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 28, no. 2, pp. 1128-1138,
2022, doi: 10.11591/ijeecs.v28.i2.pp1128-1138.
[15] V. Kuklin, I. Alexandrov, D. Polezhaev, and A. Tatarkanov, “Prospects for developing digital telecommunication complexes for
storing and analyzing media data,” Bulletin of Electrical Engineering and Informatics, vol. 12, no. 3, pp. 1536-1549, 2023,
doi: 10.11591/eei.v12i3.4840.
[16] V. Kaviani J., P. A. D. Amiri, F. Z. Brujeni, and N. Akhlaghi, “Modification data attack inside computer systems: A critical
review,” Computer Science and Information Technologies, vol. 1, no. 3, pp. 98-105, 2020, doi: 10.11591/csit.v1i3.p98-105.
[17] P. Nadee and P. Somwang, “Efficient incremental data backup of unison synchronize approach,” Bulletin of Electrical
Engineering and Informatics, vol. 10, no. 5, pp. 2707-2715, 2021, doi: 10.11591/eei.v10i5.2212.
[18] M. M. Trung, L. P. Do, D. T. Tuan, N. V. Tanh, and N. Q. Tri, “Design a cryptosystem using elliptic curves cryptography and
Vigenère symmetry key,” International Journal of Electrical and Computer Engineering (IJECE), vol. 13, no. 2, pp. 1734-1743,
2023, doi: 10.11591/ijece.v13i2.pp1734-1743.
[19] S. Deb and M. M. Haque, “Elliptic curve and pseudo-inverse matrix based cryptosystem for wireless sensor networks,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 4479-4492, 2019,
doi: 10.11591/ijece.v9i5.pp4479-4492.
[20] E. T. Oladipupo and O. C. Abikoye, “Improved authenticated elliptic curve cryptography scheme for resource starve applications,”
Computer Science and Information Technologies, vol. 3, no. 3, pp. 169-185, 2022. [Online]. Available:
https://iaesprime.com/index.php/csit/article/view/218/84
[21] B. S. B. Gowda, “Implementation of Elliptic Curve Cryptography over a Server-Clie|nt network,” 2020 5th International
Conference on Devices, Circuits and Systems (ICDCS), 2020, pp. 116-119, doi: 10.1109/ICDCS48716.2020.243562.
[22] D. Maimut and A. C. Matei, “Speeding-Up Elliptic Curve Cryptography Algorithms,” Mathematics, vol. 10, no. 19, 2022,
doi: 10.3390/math10193676.
[23] A. Malik, M. Aggarwal, B. Sharma, A. Singh, and K. K. Singh, “Optimal Elliptic Curve Cryptography-Based Effective Approach
for Secure Data Storage in Clouds,” International Journal of Knowledge and Systems Science (IJKSS), vol. 11, no. 4, 2020,
doi: 10.4018/IJKSS.2020100105.
[24] V. G. Martínez, L. H. Encinas, A. M. Muñoz, and R. D. Díaz, “Secure elliptic curves and their performance,” Logic Journal of the
IGPL, vol. 27, no. 2, 2019, doi: 10.1093/jigpal/jzy035.
[25] S. S. Dhanda, B. Singh, and P. Jindal, “Demystifying elliptic curve cryptography: Curve selection, implementation and
countermeasures to attacks,” Journal of Interdisciplinary Mathematics, vol. 23, no. 2, pp. 463-470, 2020,
doi: 10.1080/09720502.2020.1731959.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1030-1038
1038
BIOGRAPHIES OF AUTHORS
Olzhas Tasmagambetov He is a doctoral student on the specialty “Information
Security”, Gumilyov ENU, Astana, Kazakhstan. He is a specialist in the field of cybersecurity,
has publications in domestic journals. He has extensive practical experience in law
enforcement. In addition, he works at the Institute of Information Security and Cryptology as a
leading researcher. He can be contacted at email: 5999452@mail.ru.
Yerzhan Seitkulov Ph.D, Professor at the Department of Information Security,
the Gumilyov ENU, Astana, Kazakhstan. Research interests - cryptography, coding theory,
cloud computing, voice information protection, supercomputer technologies, distributed
computing. He is also the head of a number of scientific and technical projects and programs
through line ministries. Over the past 10 years, he has led 8 scientific projects in the field of
information security. He can be contacted at email: yerzhan.seitkulov@gmail.com.
Ruslan Ospanov He is a doctoral student on the specialty “Information Security”,
L.N. Gumilyov Eurasian National University, Astana, Kazakhstan. His research interests are
cryptology, blockchain technology, big data, coding theory, the Internet of things. He is the
author of the development of a new hash function, and he also developed new methods for
generating optimal s-boxes used in symmetric cryptographic algorithms. He can be contacted
at email: ospanovrm@gmail.com.
Banu Yergaliyeva She is a doctoral student on the specialty “Information
Security”, L.N. Gumilyov Eurasian National University, Astana, Kazakhstan. She is a leading
researcher at the Scientific Institute of Information Security and Cryptology. Research interests -
applied cryptography, cloud technologies, Internet of things, secure processing in the cloud,
secure storage of big data in the cloud. She can be contacted at email:
banu.yergaliyeva@gmail.com.

More Related Content

PDF
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
PPT
Fault Tolerance System
PDF
Simplified Cost Efficient Distributed System
PDF
Secure Checkpointing Approach for Mobile Environment
PDF
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
PDF
As03302670271
PDF
E0952731
PDF
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Fault Tolerance System
Simplified Cost Efficient Distributed System
Secure Checkpointing Approach for Mobile Environment
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
As03302670271
E0952731
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...

Similar to Fault-tolerant backup storage system for confidential data in distributed servers (20)

DOC
126689454 jv6
PDF
IEEE Projects 2012-2013 Network Security
PDF
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
DOCX
A secure erasure code based cloud storage
PDF
Modification of some solution techniques of combinatorial
PDF
Az24339344
DOCX
A secure erasure code based cloud storage system with secure data forwarding
PDF
M.Phil Computer Science Secure Computing Projects
PDF
M phil-computer-science-secure-computing-projects
PDF
M phil-computer-science-secure-computing-projects
PDF
M phil-computer-science-secure-computing-projects
PDF
Implementation on Data Security Approach in Dynamic Multi Hop Communication
PDF
Efficient two-stage cryptography scheme for secure distributed data storage i...
PDF
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
DOCX
A distributed fault intrusion tolerant sensor
DOCX
Harnessing the cloud for securely outsourcing large scale systems of linear e...
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
PDF
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
DOCX
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
PDF
Ci25500508
126689454 jv6
IEEE Projects 2012-2013 Network Security
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A secure erasure code based cloud storage
Modification of some solution techniques of combinatorial
Az24339344
A secure erasure code based cloud storage system with secure data forwarding
M.Phil Computer Science Secure Computing Projects
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
Implementation on Data Security Approach in Dynamic Multi Hop Communication
Efficient two-stage cryptography scheme for secure distributed data storage i...
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A distributed fault intrusion tolerant sensor
Harnessing the cloud for securely outsourcing large scale systems of linear e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
Ci25500508
Ad

More from TELKOMNIKA JOURNAL (20)

PDF
Earthquake magnitude prediction based on radon cloud data near Grindulu fault...
PDF
Implementation of ICMP flood detection and mitigation system based on softwar...
PDF
Indonesian continuous speech recognition optimization with convolution bidir...
PDF
Recognition and understanding of construction safety signs by final year engi...
PDF
The use of dolomite to overcome grounding resistance in acidic swamp land
PDF
Clustering of swamp land types against soil resistivity and grounding resistance
PDF
Hybrid methodology for parameter algebraic identification in spatial/time dom...
PDF
Integration of image processing with 6-degrees-of-freedom robotic arm for adv...
PDF
Deep learning approaches for accurate wood species recognition
PDF
Neuromarketing case study: recognition of sweet and sour taste in beverage pr...
PDF
Reversible data hiding with selective bits difference expansion and modulus f...
PDF
Website-based: smart goat farm monitoring cages
PDF
Novel internet of things-spectroscopy methods for targeted water pollutants i...
PDF
XGBoost optimization using hybrid Bayesian optimization and nested cross vali...
PDF
Convolutional neural network-based real-time drowsy driver detection for acci...
PDF
Addressing overfitting in comparative study for deep learningbased classifica...
PDF
Integrating artificial intelligence into accounting systems: a qualitative st...
PDF
Leveraging technology to improve tuberculosis patient adherence: a comprehens...
PDF
Adulterated beef detection with redundant gas sensor using optimized convolut...
PDF
A 6G THz MIMO antenna with high gain and wide bandwidth for high-speed wirele...
Earthquake magnitude prediction based on radon cloud data near Grindulu fault...
Implementation of ICMP flood detection and mitigation system based on softwar...
Indonesian continuous speech recognition optimization with convolution bidir...
Recognition and understanding of construction safety signs by final year engi...
The use of dolomite to overcome grounding resistance in acidic swamp land
Clustering of swamp land types against soil resistivity and grounding resistance
Hybrid methodology for parameter algebraic identification in spatial/time dom...
Integration of image processing with 6-degrees-of-freedom robotic arm for adv...
Deep learning approaches for accurate wood species recognition
Neuromarketing case study: recognition of sweet and sour taste in beverage pr...
Reversible data hiding with selective bits difference expansion and modulus f...
Website-based: smart goat farm monitoring cages
Novel internet of things-spectroscopy methods for targeted water pollutants i...
XGBoost optimization using hybrid Bayesian optimization and nested cross vali...
Convolutional neural network-based real-time drowsy driver detection for acci...
Addressing overfitting in comparative study for deep learningbased classifica...
Integrating artificial intelligence into accounting systems: a qualitative st...
Leveraging technology to improve tuberculosis patient adherence: a comprehens...
Adulterated beef detection with redundant gas sensor using optimized convolut...
A 6G THz MIMO antenna with high gain and wide bandwidth for high-speed wirele...
Ad

Recently uploaded (20)

PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
DOCX
573137875-Attendance-Management-System-original
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
Mechanical Engineering MATERIALS Selection
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
composite construction of structures.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Artificial Intelligence
PDF
737-MAX_SRG.pdf student reference guides
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
573137875-Attendance-Management-System-original
R24 SURVEYING LAB MANUAL for civil enggi
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Mechanical Engineering MATERIALS Selection
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Operating System & Kernel Study Guide-1 - converted.pdf
composite construction of structures.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
III.4.1.2_The_Space_Environment.p pdffdf
Foundation to blockchain - A guide to Blockchain Tech
Internet of Things (IOT) - A guide to understanding
Artificial Intelligence
737-MAX_SRG.pdf student reference guides
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026

Fault-tolerant backup storage system for confidential data in distributed servers

  • 1. TELKOMNIKA Telecommunication Computing Electronics and Control Vol. 21, No. 5, October 2023, pp. 1030~1038 ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v21i5.25305  1030 Journal homepage: http://telkomnika.uad.ac.id Fault-tolerant backup storage system for confidential data in distributed servers Olzhas Tasmagambetov, Yerzhan Seitkulov, Ruslan Ospanov, Banu Yergaliyeva Department of Information Security, L. N. Gumilyov Eurasian National University, Astana, Kazakhstan Article Info ABSTRACT Article history: Received May 08, 2023 Revised Jun 05, 2023 Accepted Jun 06, 2023 This article addresses the critical issue of securing backup storage for confidential data, a key concern in safeguarding the operations of critical information systems dealing with extensive amounts of sensitive information. The study proposes a novel cryptographic fault-tolerant backup storage system for confidential data, leveraging cryptographic algorithms and protocols. These protocols enable message encryption, ensuring decryption is only possible after a specified time period. The proposed system combines various distributed key generation protocols, proactive secret sharing protocols, asymmetric encryption algorithms, and digital signature algorithms. By employing such cryptographic protocols, it becomes feasible to develop and implement a robust, fault-tolerant service for backing up confidential data. Keywords: Backup storage Cryptographic algorithms Elliptic curve cryptography Information security System fault tolerance This is an open access article under the CC BY-SA license. Corresponding Author: Yerzhan Seitkulov Department of Information Security, L. N. Gumilyov Eurasian National University Astana, Kazakhstan Email: yerzhan.seitkulov@gmail.com 1. INTRODUCTION This study focuses on addressing the security concerns associated with backing up confidential data. It is an essential issue in maintaining the security of critical information systems that handle substantial volumes of sensitive information. Specifically, the practical methods and protocols developed in this work aim to facilitate the creation of a model for a fault-tolerant information storage service operating within specified time constraints. Requirements for methods of ensuring the availability and fault tolerance of information resources, hardware for processing and storing data are established for providing information security during maintenance of informatization objects [1]-[4]. At the same time, for this, the owners ensure the availability of a backup server room, data servers, data storage systems and data transmission channels. Depending on the class of data criticality and computing resources, deployment of a mirror-loaded hot “clone” of servers in a backup server room, an unloaded cold backup and storage of spare sets of server equipment and data storage systems, as well as copies of the information resources themselves, should be provided. In addition, redundancy of the life support systems of servers and the server room (guaranteed power supply (UPS, diesel generator sets)) and grounding, air conditioning and ventilation systems, gas fire extinguishing and access control independent of the fire safety systems of the building, as well as raised floors (to counteract flooding) is provided. Also, for critical data of a fault tolerance class with a utilization rate of at least 98.7 percent approaches to decomposition, their isolation, compatibility are used. In approaches to decomposition, computing resources are distributed between virtual machines. In approaches to their isolation, the crash of one of them does not affect the others. In approaches to compatibility, the software can run on standardized operating platforms. The above is associated with the requirements to exclude a single point of failure at the logical and physical levels of server hardware, software, separation of computing resources at the hardware and software levels.
  • 2. TELKOMNIKA Telecommun Comput El Control  Fault-tolerant backup storage system for confidential data in distributed servers (Olzhas Tasmagambetov) 1031 Fault tolerance in accordance with uniform requirements is also implemented by organizational measures by developing procedures for recovering from failures and failures of servers and software, ensuring the safety of virtual machine images, and storing spare parts in close proximity to server rooms. To achieve reliability indicators of placement inside server rooms in critical informatization objects, methods of equipment location are used to reduce the risks of threats. At the same time, one of the aspects of the fault-tolerant use of information resources is the backup storage of a complete copy of archived data. The daily operational activities of an employee using personal computers and information systems in state bodies are associated with the creation of various kinds of information necessary for decision-making and the provision of public services. The specified data and documents in electronic digital form may be with different levels of relevance to the solution of various kinds of tasks, but may be necessary in the future for the employee. Therefore, in the information and analytical activities of a civil servant, various kinds of “drafts”, “document templates”, saved responses to requests, extracts from legal acts that are not subject to accounting or do not meet the selection criteria for inclusion in the centralized information resources of the unit or archives. It should be noted that some part of the electronic information stored on computers contains personal data of citizens or other confidential information. In this regard, it can be assumed that such documents in each subdivision of the state body are stored on computer equipment, the circulation of which cannot be controlled, are of interest to intruders, and the loss of which can cause certain damage and paralyze the activities of the state body. In this light, the most secure model is the storage and processing of confidential data using a decentralized architecture in which concentration, processing and storage, as well as guaranteed destruction, are carried out according to certain protocols [5]-[7]. In this paper, we consider a model of functioning of a fault-tolerant backup storage system of protected information during a specific period using encryption techniques within a secure cryptographic framework named as elliptic curve time-lapse cryptography (ECTLC). The procedure relies on time-lapse cryptography (TLC) [8], [9], which establishes a cryptographic protocol for encrypting client data in a manner that ensures decryption cannot occur before a specific designated time, regardless of whether the sender desires it. TLC incorporates the Pedersen’s distributed key generation (DKG) protocol, the Feldman’s threshold verifiable secret sharing (VSS) protocol, and the ElGamal encryption. The agreed-upon parameters of the ElGamal encryption algorithm, including a prime number 𝑝 that generates a prime order element 𝑔, are utilized by TLC. These parameters can be found, for example, in request for comments (RFC) 3526 and RFC 5114. ECTLC employs analogous algorithms found in elliptic curve cryptography. More precisely, it employs a DKG protocol that is dependent on the discrete logarithm problem on elliptic curves, the Pedersen’s threshold VSS protocol, and the ElGamal encryption that is specifically tailored for elliptic curves (ECs). In this paper we propose new cryptographic fault-tolerant backup storage system of confidential data based on above mentioned cryptographic algorithms and protocols. It is different from Yergaliyeva et al. [10] where Shamir’s secret sharing technology and Diffie-Hellman protocol on an elliptic curve were used. Furthermore, there exists the potential to incorporate novel and enhanced algorithms into the protocol, which can offer increased efficiency and expanded functionality. Specifically, to guarantee data encryption over an extended duration, the proactive secret sharing protocol, as outlined in Sun et al. [11], can be employed. 2. METHOD Now we consider the model of functioning of a fault-tolerant backup storage system of protected information during a specific period. The parties included in the suggested model consist of: a) The portal (𝑃𝑟) responsible for receiving applications from clients to store confidential information. b) The client (𝐶𝑙) is a party who utilizes the portal as a user. c) The service (𝑆𝑟) – it consists of 𝑛 distributed servers that are geographically separated from one another, error-free and secretly performing calculations provided by the protocol, securely storing all their secret data, having a secure method of backing up data for disaster recovery. The assumption is made that the servers do not engage in collusion, meaning they do not share or transfer confidential data among themselves. All servers can privately and secretly exchange information with each other, forming a network. A threshold value 𝑡 is assumed such that at most 𝑡 − 1 servers can break the protocol and at least 𝑡 servers are reliable. The condition 𝑛 ≥ 2𝑡 − 1 (𝑡 ≤ (𝑛 + 1) 2 ⁄ ) must be satisfied, for example, if 𝑛 = 3, then 𝑡 ≤ 2. The model provides using the agreed parameters of the used elliptic curve: elliptic curve modulus-prime number 𝑝, EC equation, coefficients 𝑎 and 𝑏 of this equation from field 𝐹𝑝, EC point 𝐺 of prime order 𝑝. These settings can be found, for example, at the website of the SafeCurves project [12]. SafeCurves is a project that aims to provide elliptic-curve cryptography (ECC) security, not just elliptic curve discrete logarithm problem (ECDLP) security. It provides criteria for choosing curves that keep simple implementations safe. Efficiency is an important factor in curve selection and most standards prioritize efficiency. However,
  • 3.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1030-1038 1032 SafeCurves does not prioritize efficiency unless it interacts with security concerns. The SafeCurves website provides security ratings for various specific curves, some of which have been proposed for deployment or are currently in use. In the model under consideration, the M-511 elliptic curve can be used with the following parameters [12]. − The elliptic curve modulus, the prime number 𝑞 = 2511 − 1 = 67039039649712985497870124991029230637396829102961966888617807218608 8201503677348840093714908345171384501592909324302542687694140597328497321682450 3041861. − The elliptic curve equation 𝑦2 = 𝑥3 + 530438𝑥2 + 𝑥𝑚𝑜𝑑𝑞 − The equation coefficients 𝑎 and 𝑏 from the finite field − 𝐹𝑞: 𝑎 = 530438, 𝑏 = 1 − The base point of prime order 𝑁 on the elliptic curve 𝐺 = (𝑥𝐺, 𝑦𝐺) = (5, 17360859007097926424827522860389970695051812781717659187866778424758212450543074 5177116625808811349787373477), 𝑁 = 2508 1072475475963574762404453151406812184207075662743483302896554080882767 50620 = 83798799562141231872337656238786538296746036378702458610772259023261025 18796074108048767793830555087621410592584974489349870525087756261624609307379422 99. The M-511 curve satisfies requirements to basic parameters, ECDLP safety requirements and ECC safety requirements in addition to ECDLP safety. Curve M-511 has a sufficient security level of 2252.3 , and therefore provides resistance to various attacks [12]. Overview of the model (protocol): − Step 1: the client performs a typical login procedure on the portal. − Step 2: the client submits a data encryption request (for a specific message, 𝑚) to 𝑃𝑟. − Step 3: 𝑃𝑟 forwards the 𝐶𝑙’s request to 𝑆𝑟, including the 𝐶𝑙’s unique ID, the moment of time 𝑇𝐼𝐷 when the request was dispatched, and the designated moment of time 𝑇𝐼𝐷 + 𝛿𝐼𝐷 by which the 𝐶𝑙’s data should remain encrypted and inaccessible for decryption. These steps are illustrated in Figure 1. Figure 1. Steps 1-3 − Step 4: each service server 𝑃𝑖 receives a request. − Step 5: each server 𝑃𝑖 chooses random values 𝑎𝑖0, 𝑎𝑖1, …, 𝑎𝑖𝑘, 𝑏𝑖0, 𝑏𝑖1, …, 𝑏𝑖𝑘, where 𝑘 = 𝑡 − 1, from the field 𝐹𝑝 (i.e., 0 ≤ 𝑎𝑖𝑟 < 𝑝, 0 ≤ 𝑏𝑖𝑟 < 𝑝). 𝑎𝑖0 is a part of the private key. − Step 6: then each server 𝑃𝑖 calculates 𝑠𝑖𝑗 = 𝑎𝑖0 + 𝑎𝑖1𝑗 + 𝑎𝑖2𝑗2 + ⋯ + 𝑎𝑖𝑘𝑗𝑘(𝑚𝑜𝑑𝑞) and 𝑠′𝑖𝑗 = 𝑏𝑖0 + 𝑏𝑖1𝑗 + 𝑏𝑖2𝑗2 + ⋯ + 𝑏𝑖𝑘𝑗𝑘(𝑚𝑜𝑑𝑞), where 𝑗 ≠ 𝑖 is a number of the server 𝑃𝑗, 1 ≤ 𝑗 ≤ 𝑛. − Step 7: then each server 𝑃𝑖 calculates 𝐶𝑖𝑟 = 𝑎𝑖𝑟𝐺 + 𝑏𝑖𝑟𝐺′, 0 ≤ 𝑟 ≤ 𝑘 (here the operations of adding the points of an elliptic curve and multiplying a point by a number are applied). − Step 8: then each server 𝑃𝑖 sends 𝑠𝑖𝑗 and 𝑠′𝑖𝑗 to the servers 𝑃𝑗 over private communication channels between 𝑃𝑖 and 𝑃𝑗, and publicly publishes 𝐶𝑖𝑟 (0 ≤ 𝑟 ≤ 𝑘) with its digital signature 𝑆𝐼𝐺𝑁𝑖. − Step 9: each server 𝑃𝑖, having received 𝑠𝑗𝑖 and 𝑠′𝑗𝑖 from the servers 𝑃𝑗, 1 ≤ 𝑗 ≤ 𝑛, 𝑗 ≠ 𝑖, checks for equality 𝑠𝑗𝑖𝐺 + 𝑠′𝑗𝑖𝐺′ = ∑ 𝑖𝑟 𝐶𝑗𝑟 𝑘 𝑟=0 (∗). If equality (∗) does not hold for values 𝑠𝑗𝑖 and 𝑠′𝑗𝑖 received from the server 𝑃𝑗, then the server 𝑃𝑖 complains against 𝑃𝑗. If the server 𝑃𝑖 receives a complaint against himself, he publishes 𝑠𝑖𝑗 and 𝑠′𝑖𝑗 with his digital signature 𝑆𝐼𝐺𝑁𝑖, satisfying the equality (∗).
  • 4. TELKOMNIKA Telecommun Comput El Control  Fault-tolerant backup storage system for confidential data in distributed servers (Olzhas Tasmagambetov) 1033 − Step 10: each server 𝑃𝑖 marks as disqualified each server that received more than 𝑘 complaints or responded to a complaint with values that do not satisfy the equality (∗). − Step 11: each server 𝑃𝑖 creates a set 𝑄 of all non-disqualified servers. Each server 𝑃𝑖 from the set 𝑄 calculates 𝐴𝑖0 = 𝑎𝑖0𝐺 and publishes 𝐴𝑖0 with its digital signature 𝑆𝐼𝐺𝑁𝑖. − Step 12: each server 𝑃𝑖 from the set 𝑄 receives 𝐴𝑗0 and calculates the public key 𝑃𝑘𝑖 = ∑ 𝐴𝑗0 𝑗∈𝑄 . − Step 13: each server 𝑃𝑖 forms the key structure (𝐾𝑆) 𝐾𝐼𝐷 = (𝐼𝐷, 𝑇𝐼𝐷, 𝛿𝐼𝐷, 𝑃𝐾𝐼𝐷 = 𝑃𝑘𝑖) with its digital signature 𝑆𝐼𝐺𝑁𝑖. − Step 14: each server 𝑃𝑖 sends the generated 𝐾𝑆 to 𝑃𝑟. − Step 15: 𝑃𝑟 transmits the received 𝐾𝑆 to 𝐶𝑙. These two steps are illustrated in Figure 2. Figure 2. Steps 14-15 − Step 16: the client verifies 𝐷𝑆𝑠 𝑆𝐼𝐺𝑁𝑖(𝐾𝐼𝐷) against the published 𝐾𝑆𝑠 𝐾𝐼𝐷, ensuring that they match and meet the minimum requirements for 𝑡 participants, and also verifies the identity associated with the key structures. − Step 17: 𝐶𝑙 generates a symmetric key 𝑠 to encrypt the message 𝑚. − Step 18: 𝐶𝑙 encrypts the message 𝑚 with the key 𝑠. − Step 19: 𝐶𝑙 encrypts the symmetric key 𝑠 as follows. The key 𝑠 is placed at the point of the elliptic curve: a point 𝑀 = (𝑥, 𝑦) is chosen such that the part of the vector 𝑥 is fixed and corresponds to the key 𝑠, and the vector 𝑦 satisfies the elliptic curve equation for the selected 𝑥, i.e., 𝑦 is the square root modulo 𝑝 (Shanks’ algorithm). A random number 𝑟, 0 < 𝑟 < 𝑞 is chosen. 𝐶1 = 𝑟𝐺: 𝑟𝐺 = 𝐺 + 𝐺 + ⋯ + 𝐺 is calculated (𝑟 times) (+ is addition operation on an 𝐸𝐶). 𝐶2 = 𝑀 + 𝑟𝑃𝑘 is calculated, where 𝑃𝑘 is the public key (elliptic curve point). A pair (𝐶1, 𝐶2) is a ciphertext. − Step 20: the client sends an encrypted message 𝑚 and an encrypted symmetric key 𝑠 to the portal. This step is illustrated in Figure 3. Figure 3. Step 20 − Step 21: 𝑃𝑟 securely stores the encrypted data and encrypted key, linking them to the 𝐶𝑙’s ID and other parameters including the specified time mentioned in the request. − Step 22: once the designated time specified in the request is reached, or at any point thereafter, 𝑃𝑟 sends a request to 𝑆𝑟 to obtain a private key, providing the 𝐶𝑙’s ID, public key, and time parameters. This step is illustrated in Figure 4.
  • 5.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1030-1038 1034 Figure 4. Step 22 − Step 23: every server receives a request and distributes its private key among the other servers. − Step 24: each server obtains the private keys from the other servers, computes the combined private key, associates it with the corresponding public key, securely stores it in its database, and transmits the private key to 𝑃𝑟. − Step 25: 𝑃𝑟 receives the private key and decrypts the symmetric key using this key as follows. 𝐷𝑘𝐶1 is calculated where 𝐷𝑘 is private key. −𝐷𝑘𝐶1 is calculated (inverse element for 𝐷𝑘𝐶1). (−𝐷𝑘𝐶1) + 𝐶2 = 𝑀 is calculated. − Step 26: the portal decrypts the client’s data. Note: as a component of 𝑆𝑟, it is possible to utilize a small network of managers who operate as a cohesive management team for overseeing 𝑆𝑟. The primary duty of this team is to generate a schedule of public keys and corresponding private keys produced by 𝑆𝑟. They also manage an internal bulletin board exclusively for 𝑆𝑟’s members and maintain an open bulletin board accessible to 𝑆𝑟’s users. Every manager will keep their individual duplicates of these boards. The servers and users of the service will examine the messages posted on each copy of the bulletin board and determine the correct values based on the majority of entries. Each server in the service accompanies every message with a digital signature. The activities of all participants in the protocol are synchronized using a public and trusted clock, such as the ones provided by National Institute of Standards and Technology (NIST). The service has the capability to generate key structures periodically. For example, it can generate keys with a lifespan of one week every day, or keys with a duration of 4 hours for every interval of 20 minutes. Such a schedule is posted on the open bulletin board by the managers. Furthermore, 𝑆𝑟 has the capability to accept user requests for generating new keys with designated durations. The managers receive these requests and publicly announce them on the open bulletin board. The servers then generate keys in accordance with the protocol, sign them, and publish the signed 𝐾𝑆s on the open bulletin board. Additionally, 𝑆𝑟 welcomes user requests for generating new keys with specific lifespans. The managers handle these requests and post them on the open bulletin board. The servers adhere to the protocol to generate keys, sign them, and make the signed 𝐾𝑆s available on the open bulletin board. 3. RESULTS AND DISCUSSION The main findings of the study can be summarized as follows. The present study focuses new cryptographic fault-tolerant backup storage system of confidential data based on TLC, specifically the variant known as ECTLC. TLC refers to a method of encrypting data or information so that it can only be accessed or decrypted after a certain amount of time has passed. The time-lapse aspect is used as a security feature to ensure that the data remains protected until the specified time has elapsed. This technology is used in various applications, such as secure file storage or information sharing, where it is important to restrict access to sensitive information until a specified period has passed. The security of information systems created using time-lapse cryptography refers to the measures taken to protect sensitive and confidential information stored within these systems from unauthorized access, tampering, and theft. This can include techniques such as encryption, access control, and secure data storage practices. The goal of these security measures is to maintain the confidentiality, integrity, and availability of the information stored within the system and prevent any malicious attacks from compromising it [13]-[16]. The level of security in a time-lapse cryptography system depends on various factors, such as the complexity of the cryptographic algorithms used, the robustness of the underlying infrastructure, and the implementation of secure software development practices [17]-[19].
  • 6. TELKOMNIKA Telecommun Comput El Control  Fault-tolerant backup storage system for confidential data in distributed servers (Olzhas Tasmagambetov) 1035 ECTLC is a modification of TLC that is based on elliptic curves. The security of ECTLC is based on the hardness of the discrete logarithm problem (DLP) over elliptic curves. As long as this problem remains hard, the encrypted information will be secure against unauthorized access. However, it is crucial to emphasize that the security of ECTLC is only as strong as the weakest link in the system, and various factors such as implementation errors, side-channel attacks, or weaknesses in the underlying cryptographic primitives can affect the overall security of the system. It is important to properly implement and deploy ECTLC in order to ensure its security. This includes proper selection of cryptographic parameters, secure implementation of cryptographic primitives, and proper handling of keys and encrypted information. Additionally, it is important to regularly assess the security of this protocol in light of new developments in cryptography and computer science to ensure that it continues to provide a high level of security [20]-[22]. The DKG protocol based on the DLP on EC, used in ECTLC, is a cryptographic algorithm for generating shared secret keys between multiple parties in a secure and efficient manner. The security of such a protocol relies on the computational hardness of the DLP over EC. In these protocols, each participant generates a public-private key pair, and the public keys are combined to generate a shared secret key. The security of the shared secret key relies on the intractability of the DLP over EC. As long as this problem remains hard, the shared secret key will be secure against unauthorized access. Pedersen verifiable threshold secret sharing protocol, used in ECTLC, is a cryptographic protocol for securely sharing a secret among multiple parties in such a way that a threshold of parties must cooperate to reconstruct the secret. The security of the Pedersen’s threshold VSS protocol relies on the hardness of the DLP and the computational indistinguishability of the commitment scheme used. In this protocol, a dealer distributes shares of the secret to each participant, and any threshold number of participants can cooperate to reconstruct the secret. The protocol also includes a verifiable reconstruction process, in which any participant can verify the correctness of the reconstructed secret, ensuring that the secret has not been tampered with or reconstructed incorrectly. The security of the protocol is considered to be strong as long as the underlying cryptographic assumptions hold. The ElGamal encryption algorithm on elliptic curves, used in TLC, is a public-key encryption algorithm that is based on the mathematical problem of computing discrete logarithms over elliptic curves. The security of ElGamal encryption on elliptic curves is based on the computational hardness of the DLP over elliptic curves. In the ElGamal encryption algorithm, a sender encrypts a message using the recipient’s public key, and the recipient can then decrypt the message using their private key. The security of the encrypted message relies on the intractability of the DLP over elliptic curves, making it computationally infeasible for an attacker to compute the private key from the public key [23]-[25]. In this model, the client performs a standard login to the portal. This step is a standard login process that is generally considered secure, provided the portal has implemented secure authentication mechanism. It is important to ensure that the authentication mechanisms used by the portal are strong enough to prevent unauthorized access to the system. This may include methods such as multi-factor authentication, strong password policies, and encryption of sensitive user data. Additionally, within the model, 𝐶𝑙 submits a request to 𝑃𝑟 to encrypt specific information, denoted as message 𝑚. The security of this step depends on the encryption algorithm used, as well as the secure transmission of the message to the portal. If the encryption algorithm used is strong and the transmission of the message is secure (eg., using SSL/TLS), then this step can be considered secure. In this step, 𝑃𝑟 forwards the 𝐶𝑙’s request to 𝑆𝑟, including essential details such as 𝐶𝑙’s unique ID, the timestamp of the request, and the designated timeframe during which 𝐶𝑙’s data must remain encrypted and inaccessible for decryption. The security of this step depends on the security of the transfer of the request from the portal to the service, as well as the secure storage of metadata by the portal and the service. It is important to secure the transmission of the request and the secure storage of the metadata. In addition, the use of a unique customer ID and decryption time limits can help prevent unauthorized access to customer data. In general, the security of the steps in the considered model depends on various factors, such as the security of the authentication mechanisms, the strength of the encryption algorithm used, and the secure transmission and storage of data. It is important to ensure that all these factors are carefully considered and implemented to ensure the security of the system. In comparison with other studies, the present study contributes by specifically focusing on the application of TLC and its variant, ECTLC, based on elliptic curves. While other studies may have explored different cryptographic methods or variants, this study delves into the security aspects, underlying protocols, and algorithms specific to ECTLC. The findings of this study have significant implications for the field of cryptography and information security. TLC, especially ECTLC, offers an additional layer of security by leveraging the time factor for data access. The use of elliptic curves and the reliance on the hardness of the DLP provide strong security guarantees, but proper implementation and deployment are crucial for maintaining the overall security of the system. The DKG protocol and the Pedersen’s threshold VSS protocol provide secure ways of generating shared secret keys and sharing secrets among multiple parties. These protocols offer robust security as long as the underlying cryptographic assumptions hold, ensuring that
  • 7.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1030-1038 1036 sensitive information remains protected and tamper-proof. The ElGamal encryption algorithm on elliptic curves provides secure communication through public-key encryption. The intractability of the DLP over ECs ensures the confidentiality of the encrypted messages, protecting them from unauthorized access. The strengths of this study lie in its focus on time-lapse cryptography, specifically ECTLC, and its detailed exploration of the underlying protocols and algorithms. The study provides a comprehensive understanding of the security aspects of ECTLC, including the distributed key generation protocol, the Pedersen’s threshold VSS protocol, and the ElGamal encryption algorithm. It is important to note that, as with any cryptographic protocol, the security of these algorithms is only as strong as the weakest link in the system, and various factors such as implementation errors, side-channel attacks, or weaknesses in the underlying cryptographic primitives can affect the overall security of the system. It is important to properly implement and deploy such protocols in order to ensure its security. This includes proper selection of cryptographic parameters, secure implementation of cryptographic primitives, and proper handling of keys and encrypted messages. Additionally, it is important to regularly assess the security of this algorithm in light of new developments in cryptography and computer science to ensure that it continues to provide a high level of security. In conclusion, TLC, particularly the variant ECTLC, offers an innovative approach to securing data and information. The use of elliptic curves and the reliance on the hardness of the DLP provide a strong foundation for security. However, proper implementation, secure software development practices, and regular security assessments are essential to maintain the overall security of the system. Recommendations for future research include conducting empirical studies to evaluate the real-world effectiveness and performance of ECTLC, including its resistance to potential attacks. Furthermore, staying updated with new developments in cryptography and computer science is crucial to ensure that ECTLC continues to provide a high level of security. Additionally, exploring potential applications and use cases for TLC and ECTLC in various domains can help further understand their practical implications and benefits. 4. CONCLUSION In this paper, a model of functioning of a fault-tolerant backup data storage system for a given time is considered. The model is based on the cryptographic encryption protocol for a given time ECTLC. The protocol effectively combines the DKG protocol that relies on the discrete logarithm on ECs, the Pedersen’s threshold VSS protocol, an ElGamal encryption on ECs, and an electronic DS. The protocol permits the usage of predefined parameters, which include the prime number modulus (𝑝) of the EC, the equation and coefficients (𝑎 and 𝑏) of the EC from the field (𝐹𝑝), and a point (𝐺) on the EC with a prime order (𝑞) specifically for the ElGamal encryption on EC. A fault-tolerant backup storage system for confidential data in distributed servers based on ECTLC is a specialized solution designed to provide both data protection and fault tolerance while incorporating cryptographic techniques that take into account the passage of time. This type of system utilizes distributed storage architecture, where data is replicated across multiple servers or nodes. The redundancy ensures that even if one or more servers fail, the confidential data remains accessible and intact. The distributed nature of the system also enhances fault tolerance and resilience to hardware failures. By combining fault tolerance mechanisms with ECTLC, the system ensures the protection and availability of confidential data stored in distributed servers. It addresses potential hardware failures and provides secure transmission of sensitive information over extended periods, all while maintaining the confidentiality and integrity of the data. It is worth noting that further research and evaluation are necessary to assess the efficiency, security, and effectiveness of the fault-tolerant backup storage system based on time-lapse cryptography. Ongoing studies can help refine the protocols, algorithms, and parameters used and ensure that the system remains resistant to known attacks and meets the evolving security requirements for safeguarding confidential data in distributed environments. Hence, it will be essential to conduct a study in the future to evaluate and choose the most efficient algorithms and parameters mentioned earlier for the developed protocol. The ECTLC protocol, which is derived from TLC, presents a solution for transmitting confidential messages to future recipients. However, instead of the distributed key generation, verifiable thresholding, and encryption algorithms used in TLC, algorithms based on elliptic curve cryptography are used, which suggests greater efficiency. At the same time, it is assumed that these changes do not affect the resistance to known attacks. ACKNOWLEDGEMENTS This work is supported by the SC of the MSHE of the Republic of Kazakhstan, grant No. AP14869013.
  • 8. TELKOMNIKA Telecommun Comput El Control  Fault-tolerant backup storage system for confidential data in distributed servers (Olzhas Tasmagambetov) 1037 REFERENCES [1] D. Arivudainambi and K. A. V. Kumar, “Performance analysis of security framework for software defined network architectures,” International Journal of Advances in Applied Sciences (IJAAS), vol. 8, no. 3, pp. 232-242, 2019, doi: 10.11591/ijaas.v8.i3.pp232-242. [2] W. Hassan, T. -S. Chou, X. Li, P. A. -Kubi, and T. Omar, “Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks,” The International Journal of Informatics and Communication Technology (IJ-ICT), vol. 8, no. 3, pp. 162-183, 2019, doi: 10.11591/ijict.v8i3.pp162-183. [3] H. J. Muhasin, A. Y. Gheni, and H. A. Yousif, “Proposed model for data protection in information systems of government institutions,” Bulletin of Electrical Engineering and Informatics, vol. 11, no. 3, pp. 1715-1722, 2022, doi: 10.11591/eei.v11i3.3727. [4] L. Hoti, K. Dermaku, S. Klaiqi, and H. Dermaku, “Protection and Exchange of Personal Data on the Web in the Registry of Civil Status,” Emerging Science Journal, vol. 7, no. 1, 2023, doi: 10.28991/ESJ-2023-07-01-03. [5] O. Farion, A. Balendr, O. Androshchuk, A. Mostovyi, and V. Grinchenko, “Methods of Extraction and Analysis of Intelligence to Combat Threats of Organized Crime at the Border,” Journal of Human, Earth, and Future, vol. 3, no. 3, 2022, doi: 10.28991/HEF-2022-03-03-07. [6] M. Riasetiawan and A. Ashari, “A Proposed Framework of Knowledge Management for COVID-19 Mitigation based on Big Data Analytic,” Emerging Science Journal, vol. 7, 2023, doi: 10.28991/ESJ-2023-SPER-015. [7] Z. D. Abbass, J. S. Maatooq, and M. M. Al-Mukhtar, “Monitoring and Modelling Morphological Changes in Rivers Using RS and GIS Techniques,” Civil Engineering Journal, vol. 9, no. 3, 2023, doi: 10.28991/CEJ-2023-09-03-03. [8] M. O. Rabin and C. A. Thorpe, “Method and apparatus for time-lapse cryptography,” U.S. Patent, 2007. [Online]. Available: https://patents.google.com/patent/US8526621B2/en [9] M. O. Rabin, and C. A. Thorpe, “Time-lapse cryptography,” Technical report TR-22-06, 2006. [Online]. Available: https://dash.harvard.edu/handle/1/26506434 [10] B. Yergaliyeva, Y. Seitkulov, D. Satybaldina, and R. Ospanov, “On some methods of storing data in the cloud for a given time,” Telecommunication, Computing, Electronics and Control (TELKOMNIKA), vol. 20, no. 2, pp. 366-372, 2022, doi: 10.12928/TELKOMNIKA.v20i2.21887. [11] H. Sun, X. Zheng, and Y. Yu, “A Proactive Secret Sharing Scheme Based on Elliptic Curve Cryptography,” 2009 First International Workshop on Education Technology and Computer Science, 2009, pp. 666-669, doi: 10.1109/ETCS.2009.408. [12] D. J. Bernstein and T. Lange, “SafeCurves: choosing safe curves for elliptic-curve cryptography,” SafeCurves. [Online]. Available: https://cr.yp.to/talks/2014.01.18/slides-dan+tanja-20140118-a4.pdf [13] S. K. Ibrahim and S. A. Abdulhussien, “Improved storage area network method for backup approach,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 17, no. 3, pp. 1493-1498, 2020, doi: 10.11591/ijeecs.v17.i3.pp1493-1498. [14] I. M. Sukarsa, I. K. A. M. Antara, P. W. Buana, I. P. A. Bayupati, N. W. Wisswani, and D. W. Puteri, “Data storage model in low- cost mobile applications,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 28, no. 2, pp. 1128-1138, 2022, doi: 10.11591/ijeecs.v28.i2.pp1128-1138. [15] V. Kuklin, I. Alexandrov, D. Polezhaev, and A. Tatarkanov, “Prospects for developing digital telecommunication complexes for storing and analyzing media data,” Bulletin of Electrical Engineering and Informatics, vol. 12, no. 3, pp. 1536-1549, 2023, doi: 10.11591/eei.v12i3.4840. [16] V. Kaviani J., P. A. D. Amiri, F. Z. Brujeni, and N. Akhlaghi, “Modification data attack inside computer systems: A critical review,” Computer Science and Information Technologies, vol. 1, no. 3, pp. 98-105, 2020, doi: 10.11591/csit.v1i3.p98-105. [17] P. Nadee and P. Somwang, “Efficient incremental data backup of unison synchronize approach,” Bulletin of Electrical Engineering and Informatics, vol. 10, no. 5, pp. 2707-2715, 2021, doi: 10.11591/eei.v10i5.2212. [18] M. M. Trung, L. P. Do, D. T. Tuan, N. V. Tanh, and N. Q. Tri, “Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key,” International Journal of Electrical and Computer Engineering (IJECE), vol. 13, no. 2, pp. 1734-1743, 2023, doi: 10.11591/ijece.v13i2.pp1734-1743. [19] S. Deb and M. M. Haque, “Elliptic curve and pseudo-inverse matrix based cryptosystem for wireless sensor networks,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 4479-4492, 2019, doi: 10.11591/ijece.v9i5.pp4479-4492. [20] E. T. Oladipupo and O. C. Abikoye, “Improved authenticated elliptic curve cryptography scheme for resource starve applications,” Computer Science and Information Technologies, vol. 3, no. 3, pp. 169-185, 2022. [Online]. Available: https://iaesprime.com/index.php/csit/article/view/218/84 [21] B. S. B. Gowda, “Implementation of Elliptic Curve Cryptography over a Server-Clie|nt network,” 2020 5th International Conference on Devices, Circuits and Systems (ICDCS), 2020, pp. 116-119, doi: 10.1109/ICDCS48716.2020.243562. [22] D. Maimut and A. C. Matei, “Speeding-Up Elliptic Curve Cryptography Algorithms,” Mathematics, vol. 10, no. 19, 2022, doi: 10.3390/math10193676. [23] A. Malik, M. Aggarwal, B. Sharma, A. Singh, and K. K. Singh, “Optimal Elliptic Curve Cryptography-Based Effective Approach for Secure Data Storage in Clouds,” International Journal of Knowledge and Systems Science (IJKSS), vol. 11, no. 4, 2020, doi: 10.4018/IJKSS.2020100105. [24] V. G. Martínez, L. H. Encinas, A. M. Muñoz, and R. D. Díaz, “Secure elliptic curves and their performance,” Logic Journal of the IGPL, vol. 27, no. 2, 2019, doi: 10.1093/jigpal/jzy035. [25] S. S. Dhanda, B. Singh, and P. Jindal, “Demystifying elliptic curve cryptography: Curve selection, implementation and countermeasures to attacks,” Journal of Interdisciplinary Mathematics, vol. 23, no. 2, pp. 463-470, 2020, doi: 10.1080/09720502.2020.1731959.
  • 9.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1030-1038 1038 BIOGRAPHIES OF AUTHORS Olzhas Tasmagambetov He is a doctoral student on the specialty “Information Security”, Gumilyov ENU, Astana, Kazakhstan. He is a specialist in the field of cybersecurity, has publications in domestic journals. He has extensive practical experience in law enforcement. In addition, he works at the Institute of Information Security and Cryptology as a leading researcher. He can be contacted at email: 5999452@mail.ru. Yerzhan Seitkulov Ph.D, Professor at the Department of Information Security, the Gumilyov ENU, Astana, Kazakhstan. Research interests - cryptography, coding theory, cloud computing, voice information protection, supercomputer technologies, distributed computing. He is also the head of a number of scientific and technical projects and programs through line ministries. Over the past 10 years, he has led 8 scientific projects in the field of information security. He can be contacted at email: yerzhan.seitkulov@gmail.com. Ruslan Ospanov He is a doctoral student on the specialty “Information Security”, L.N. Gumilyov Eurasian National University, Astana, Kazakhstan. His research interests are cryptology, blockchain technology, big data, coding theory, the Internet of things. He is the author of the development of a new hash function, and he also developed new methods for generating optimal s-boxes used in symmetric cryptographic algorithms. He can be contacted at email: ospanovrm@gmail.com. Banu Yergaliyeva She is a doctoral student on the specialty “Information Security”, L.N. Gumilyov Eurasian National University, Astana, Kazakhstan. She is a leading researcher at the Scientific Institute of Information Security and Cryptology. Research interests - applied cryptography, cloud technologies, Internet of things, secure processing in the cloud, secure storage of big data in the cloud. She can be contacted at email: banu.yergaliyeva@gmail.com.