Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted Data

Author(s):  
Katarzyna Kapusta ◽  
Gerard Memmi
2021 ◽  
Vol 14 (7) ◽  
pp. 1167-1174
Author(s):  
Zsolt István ◽  
Soujanya Ponnapalli ◽  
Vijay Chidambaram

Most modern data processing pipelines run on top of a distributed storage layer, and securing the whole system, and the storage layer in particular, against accidental or malicious misuse is crucial to ensuring compliance to rules and regulations. Enforcing data protection and privacy rules, however, stands at odds with the requirement to achieve higher and higher access bandwidths and processing rates in large data processing pipelines. In this work we describe our proposal for the path forward that reconciles the two goals. We call our approach "Software-Defined Data Protection" (SDP). Its premise is simple, yet powerful: decoupling often changing policies from request-level enforcement allows distributed smart storage nodes to implement the latter at line-rate. Existing and future data protection frameworks can be translated to the same hardware interface which allows storage nodes to offload enforcement efficiently both for company-specific rules and regulations, such as GDPR or CCPA. While SDP is a promising approach, there are several remaining challenges to making this vision reality. As we explain in the paper, overcoming these will require collaboration across several domains, including security, databases and specialized hardware design.


2020 ◽  
Vol 17 (8) ◽  
pp. 3631-3635
Author(s):  
L. Mary Gladence ◽  
Priyanka Reddy ◽  
Apoorva Shetty ◽  
E. Brumancia ◽  
Senduru Srinivasulu

Data deduplication is one of the main techniques for copying recovery data duplicates and was widely used in distributed storage to minimize extra space and spare data transfer capacity. It was proposed that the simultaneous encryption method encode the data before re-appropriating to preserve the confidentiality of delicate data while facilitating de replication. Unlike conventional de duplication systems, consumers are therefore viewed as having differential advantages as indupli-cate tests other than the data itself. Security analysis shows that our approach is safe in terms of the values set out in the proposed security model. For this deduplication M3 encryption algorithm and DES algorithm are used. M3 encryption is to compare another with the latest technology, for more effective, security purposes, fast actions and. The second DES encryption that was used to open the file and decrypt understandable language for humans in a secure language. A model of our current accepted copy check program is revised as proof of concept by the current research and explicitly shows the tests using our model. The proposed research shows that when opposed to conventional operations, our proposed duplicate test plot creates marginal overhead.


2020 ◽  
Vol 2020 ◽  
pp. 1-16 ◽  
Author(s):  
Jing Liu ◽  
Changbo Yuan ◽  
Yingxu Lai ◽  
Hua Qin

Industrial Internet technology has developed rapidly, and the security of industrial data has received much attention. At present, industrial enterprises lack a safe and professional data security system. Thus, industries urgently need a complete and effective data protection scheme. This study develops a three-layer framework with local/fog/cloud storage for protecting sensitive industrial data and defines a threat model. For real-time sensitive industrial data, we use the improved local differential privacy algorithm M-RAPPOR to perturb sensitive information. We encode the desensitized data using Reed–Solomon (RS) encoding and then store them in local equipment to realize low cost, high efficiency, and intelligent data protection. For non-real-time sensitive industrial data, we adopt a cloud-fog collaborative storage scheme based on AES-RS encoding to invisibly provide multilayer protection. We adopt the optimal solution of distributed storage in local equipment and the cloud-fog collaborative storage scheme in fog nodes and cloud nodes to alleviate the storage pressure on local equipment and to improve security and recoverability. According to the defined threat model, we conduct a security analysis and prove that the proposed scheme can provide stronger data protection for sensitive data. Compared with traditional methods, this approach strengthens the protection of sensitive information and ensures real-time continuity of open data sharing. Finally, the feasibility of our scheme is validated through experimental evaluation.


2021 ◽  
Vol 1 (1) ◽  
pp. 1-6
Author(s):  
Togar Timoteus Gultom

The higher the value of a data, the higher the risk of damage or loss of the data. This is understandable, because high-value data is like "life" for humans, so if a data has been damaged or even lost, then the data has no meaning anymore. There are many ways to protect data. Data protection uses a method called encryption process which encodes the code in the original text into arbitrary characters. So that the contents of the encrypted data can be read again, it is necessary to change the contents of the data to its original form, this process is called decryption. In this study, a File Security System Protection Application Design was made using a hybrid affine cipher and the RSA algorithm. This application is made using the Delphi 7.0 Programming Language.


Blockchain technologies are becoming more popular in securing the sensitive data such as government holding citizens’ s wealth, health and personal information. A blockchain is a shared encrypted data of records, consisting of a ledger of transactions. As the data stored in blockchain is tamper proof, it is proposed to implement new Aadhar enrolments with P2P Blockchains and migrate the existing centralized Aadhar personnel’s personal data from the conventional RDBMS / Big data system repositories to distributed ledger technologies by creating private blockchains. In this paper, we will discuss how to provide security for Aadhar card enrolment data using blockchain architectures. A blockchain-based Aadhaar would help UIDAI in truly complying with the data protection and privacy stipulations outlined in the Right to Privacy Act judgment


Sign in / Sign up

Export Citation Format

Share Document