Thumbnail
Access Restriction
Open

Author Hemalatha, S. ♦ Chezian, Dr. R. Manicka
Source CiteSeerX
Content type Text
File Format PDF
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Cloud Computing ♦ Data Partitioning ♦ Implicit Security Architecture Framework ♦ Security Key Distribution ♦ Several Variation ♦ Important Aspect ♦ Restricted Field ♦ Traditional Solution ♦ Data Partitioning Method ♦ Large Data Center ♦ Unique Attribute ♦ Implicit Storage ♦ Original Data ♦ Login Password ♦ Many New Security Challenge ♦ User Data ♦ Next-generation Architecture ♦ Salient Feature ♦ Personnel Control ♦ Flexible Distributed Scheme ♦ Application Software ♦ Data Reconstruction ♦ Encryption Key ♦ Cloud Data Storage
Abstract Abstract: Cloud computing technology has been visualized as the next-generation architecture of IT venture. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing shifts the application software and databases to the large data centers, where the management of the data and services may not be fully reliable. This unique attribute, however, impose many new security challenges which have not been well understood. In this paper, we focus on security based on cloud data storage, which has always been an important aspect of quality of service. To ensure the correctness of user’s data in the cloud, we suggest an effective and flexible distributed scheme with two salient features, contrasting to its predecessors. We illustrate the use of a data partitioning method for implementing such security involving the roots of a polynomial in restricted field. The partitions are stored on randomly chosen servers on the network and they need to be retrieved to reconstruct the original data. Data reconstruction requires access to each server, the knowledge of the servers on which the partitions are stored and login password. Several variations of this scheme are described, which include the implicit storage of encryption keys rather than the data, and where a subset of the partitions may be brought together to reconstruct the data.
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study
Learning Resource Type Article