dc.contributor.author |
Zhao, G |
en |
dc.contributor.author |
Jaatun, MG |
en |
dc.contributor.author |
Vasilakos, A |
en |
dc.contributor.author |
Nyre, AA |
en |
dc.contributor.author |
Alapnesy, S |
en |
dc.contributor.author |
Yue, Q |
en |
dc.contributor.author |
Tang, Y |
en |
dc.date.accessioned |
2014-03-01T02:47:19Z |
|
dc.date.available |
2014-03-01T02:47:19Z |
|
dc.date.issued |
2011 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/33076 |
|
dc.subject |
Cloud Computing |
en |
dc.subject |
Data Model |
en |
dc.subject |
Electronic Mail |
en |
dc.subject |
Image Reconstruction |
en |
dc.subject.other |
Formal model |
en |
dc.subject.other |
Security analysis |
en |
dc.subject.other |
Sensitive datas |
en |
dc.subject.other |
Storage services |
en |
dc.subject.other |
Computer systems |
en |
dc.subject.other |
Rain |
en |
dc.subject.other |
Cloud computing |
en |
dc.title |
Deliverance from trust through a redundant array of independent net-storages in cloud computing |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/INFCOMW.2011.5928888 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/INFCOMW.2011.5928888 |
en |
heal.identifier.secondary |
5928888 |
en |
heal.publicationDate |
2011 |
en |
heal.abstract |
Cloud storage services are gaining more and more attention. Surveys suggest that the confidentiality issue is one of the major obstacles for users to use cloud storage services to keep sensitive data. This paper proposes to deploy a Redundant Array of Independent Net-storages (RAIN) for confidentiality control in Cloud Computing. The RAIN approach splits data into segments and distributes segments onto multiple storage providers, without having to trust each provider. By keeping the distribution of segments and the relationships between the distributed segments private, the original data cannot be reassembled. When the segments are small enough, each segment discloses no meaningful information to others. Hence RAIN is able to ensure the confidentiality of data stored on clouds. A formal model of the proposed approach has been developed to articulate the process. Security analysis has been performed, indicating that the proposed approach can implement confidentiality protection without the need of encrypting the data. © 2011 IEEE. |
en |
heal.journalName |
2011 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011 |
en |
dc.identifier.doi |
10.1109/INFCOMW.2011.5928888 |
en |
dc.identifier.spage |
625 |
en |
dc.identifier.epage |
630 |
en |