HEAL DSpace

Deliverance from trust through a redundant array of independent net-storages in cloud computing

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Zhao, G en
dc.contributor.author Jaatun, MG en
dc.contributor.author Vasilakos, A en
dc.contributor.author Nyre, AA en
dc.contributor.author Alapnesy, S en
dc.contributor.author Yue, Q en
dc.contributor.author Tang, Y en
dc.date.accessioned 2014-03-01T02:47:19Z
dc.date.available 2014-03-01T02:47:19Z
dc.date.issued 2011 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/33076
dc.subject Cloud Computing en
dc.subject Data Model en
dc.subject Electronic Mail en
dc.subject Image Reconstruction en
dc.subject.other Formal model en
dc.subject.other Security analysis en
dc.subject.other Sensitive datas en
dc.subject.other Storage services en
dc.subject.other Computer systems en
dc.subject.other Rain en
dc.subject.other Cloud computing en
dc.title Deliverance from trust through a redundant array of independent net-storages in cloud computing en
heal.type conferenceItem en
heal.identifier.primary 10.1109/INFCOMW.2011.5928888 en
heal.identifier.secondary http://dx.doi.org/10.1109/INFCOMW.2011.5928888 en
heal.identifier.secondary 5928888 en
heal.publicationDate 2011 en
heal.abstract Cloud storage services are gaining more and more attention. Surveys suggest that the confidentiality issue is one of the major obstacles for users to use cloud storage services to keep sensitive data. This paper proposes to deploy a Redundant Array of Independent Net-storages (RAIN) for confidentiality control in Cloud Computing. The RAIN approach splits data into segments and distributes segments onto multiple storage providers, without having to trust each provider. By keeping the distribution of segments and the relationships between the distributed segments private, the original data cannot be reassembled. When the segments are small enough, each segment discloses no meaningful information to others. Hence RAIN is able to ensure the confidentiality of data stored on clouds. A formal model of the proposed approach has been developed to articulate the process. Security analysis has been performed, indicating that the proposed approach can implement confidentiality protection without the need of encrypting the data. © 2011 IEEE. en
heal.journalName 2011 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011 en
dc.identifier.doi 10.1109/INFCOMW.2011.5928888 en
dc.identifier.spage 625 en
dc.identifier.epage 630 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής