Key management for outsourced data security

2014 ◽  
Vol 19 (5) ◽  
pp. 449-454
Author(s):  
Bei Pei ◽  
Changsong Chen ◽  
Changsheng Wan
Author(s):  
Vairaprakash Gurusamy ◽  
◽  
S. Kannan ◽  
T. Maria Mahajan ◽  
◽  
...  

2018 ◽  
Vol 8 (1) ◽  
pp. 30-36
Author(s):  
Роман Котельников ◽  
Roman Kotelnikov ◽  
Алескандр Мартынюк ◽  
Aleskandr Martynyuk

Timely availability of accurate burned out area data is a key management aspect in forest protection arrange-ments. Special operation multilevel net-work including field surveys of burned out areas has been established now to verify appropriate data accuracy. In the mean time extensive levels of information from various sources accumulated in wildfire databases enable statistical assessment of the data accuracy drastically reducing time and financial costs of verification operations. Mathematically proven that amount of numbers that specify real natural facilities may grow exponentially due to the Benford law. The paper proves applicability of the Benford law provisions in assessment of wildfire area data accuracy through analysis of first figure occurrence in numbers specifying forest covered burned out area in the Russian Federation territory in 2016 and assessed a minimum set of values needed for an adequate result. In addition the paper highlights an opportunity of variously outsourced data accuracy comparative analysis. Taking into consideration that variation of individual figure occurrence frequency in analyzed value packages may have a different sign for various figures it is offered to apply an indicator representing a mean value of appropriate figure occurrence probability variation modules. The offered procedure based on the Benford law application may be a part of a risk-targeted approach to plan control supervisory operations in forest relations.


2020 ◽  
Vol 2020 ◽  
pp. 1-24
Author(s):  
Xiabing Zhou ◽  
Bin Li ◽  
Yanrong Qi ◽  
Wanying Dong

With the rapid development of the Internet, the security of network multimedia data has attracted increasingly more attention. The moving target defense (MTD) and cyber mimic defense (CMD) approaches provide a new way to solve this problem. To enhance the security of network multimedia data, this paper proposes a mimic encryption box for network multimedia data security. The mimic encryption box can directly access the network where the multimedia device is located, automatically complete the negotiation, provide safe and convenient encryption services, and effectively prevent network attacks. According to the principles of dynamization, diversification, and randomization, the mimic encryption box uses a reconfigurable encryption algorithm to encrypt network data and uses IP address hopping, port number hopping, protocol camouflage, and network channel change to increase the attack threshold. Second, the mimic encryption box has a built-in pseudorandom number generator and key management system, which can generate an initial random key and update the key with the hash value of the data packet to achieve “one packet, one key.” Finally, through the cooperation of the ARM and the FPGA, an access control list can be used to filter illegal data and monitor the working status of the system in real time. If an abnormality is found, the feedback reconstruction mechanism is used to “clean” the FPGA to make it work normally again. The experimental results and analysis show that the mimic encryption box designed in this paper has high network encryption performance and can effectively prevent data leakage. At the same time, it provides a mimic security defense mechanism at multiple levels, which can effectively resist a variety of network attacks and has high security.


2017 ◽  
Vol 379 ◽  
pp. 42-61 ◽  
Author(s):  
Yinghui Zhang ◽  
Xiaofeng Chen ◽  
Jin Li ◽  
Duncan S. Wong ◽  
Hui Li ◽  
...  

Cloud computing is one of the important business models in the modern Information Technology. It provides various services (hardware, software) to the users with minimal interaction and low-cost. Storage service is one of the most useful services in cloud computing, which move data owners data from local computing system to the cloud. In this paradigm, once the data moves from the local computing system to the cloud, the data owner lost the physical control of the outsourced data on the cloud. So that, storage service creates data security challenges. Therefore, the integrity of the outsourced data has to be verified frequently using public or private verification method. In this paper we focus on two data security concern such as data confidentiality and remote data integrity on cloud storage system. In order to ensure the data integrity and reduce the data owners computational resources, in this work we have proposed a remote data integrity auditing methods such as Remote Data Audit using Protocol(RDAP) and Remote Data Audit using Digital Signature (RDADS) methods. To analyze the performance of the system, first, we define the single data owner on multiple servers and then multiple data owners on a single server for public data verification. Besides, these methods not only verify the integrity of data, but also detect the invalid data block during the verification process.


Sign in / Sign up

Export Citation Format

Share Document