The disintegration protocol: An ultimate technique for cloud data security

BS Rawal, HK Kalutarage, SS Vivek… - … Conference on Smart …, 2016 - ieeexplore.ieee.org
2016 IEEE International Conference on Smart Cloud (SmartCloud), 2016ieeexplore.ieee.org
There has been an accelerating trend in outsourcing data to Cloud Service Providers
(CSPs) who offer huge storage space for a little cost. Once data goes into the cloud, owners
lose control of their data, which inevitably brings new security risks toward integrity and
confidentiality. These worries security and restrict the use of cloud services not so much
malleable. In this paper, we also propose a similar disintegration technique for cyber
defense. In general, the server is designed to perform N number of different tasks (functions) …
There has been an accelerating trend in outsourcing data to Cloud Service Providers (CSPs) who offer huge storage space for a little cost. Once data goes into the cloud, owners lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. These worries security and restrict the use of cloud services not so much malleable. In this paper, we also propose a similar disintegration technique for cyber defense. In general, the server is designed to perform N number of different tasks (functions). We disintegrate the suite of web services to N separate services and move them from one server and distribute among M homogeneous servers. We demonstrate design and implementation of the unidirectional, closed and Disintegrated Protocol (DIP) to achieve this.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果