Seats of Tension: Collaboration, Access, Security, Expression

Keyword(s):  
2003 ◽  
Vol 22 (8) ◽  
pp. 695-706 ◽  
Author(s):  
Aykut Guven ◽  
Ibrahim Sogukpinar

1996 ◽  
Vol 15 (6) ◽  
pp. 520 ◽  
Author(s):  
Helen Meyer
Keyword(s):  

Author(s):  
Md. Abbas Ali Khan ◽  
Mohammad Hanif Ali ◽  
A. K. M. Fazlul Haque ◽  
Chandan Debnath ◽  
Md. Ismail Jabiullah ◽  
...  

Author(s):  
Vitthal Sadashiv Gutte ◽  
Sita Devulapalli

Correctness of data and efficient mechanisms for data security, while transferring the file to and from Cloud, are of paramount importance in today's cloud-centric processing. A mechanism for correctness and efficient transfer of data is proposed in this article. While processing users request data, a set of attributes are defined and checked. States with attributes at different levels are defined to prevent unauthorized access. Security is provided while storing the data using a chunk generation algorithm and verification of chunks using lightweight Third-Party Auditor (TPA). TPA uses digital signatures to verify user's data that are generated by RSA with MD5 algorithms. The metadata file of generated chunks is encrypted using a modified AES algorithm. The proposed method prevents unauthorized users from accessing the data in the cloud environment, in addition to maintaining data integrity. Results of the proposed cloud security model implementation are discussed.


Author(s):  
Steve Adam ◽  
Joseph T. Hlady

Engineering data is often collected for a single purpose and then lost, corrupted, duplicated, or simply not accessible to all who may want to use it. The value of data often goes beyond its purchase and the result of the intended purpose. Access, security, and further leveraging data are but a few advantages to keeping data safe and sharing it. Furthermore, the amount of data on any project or within an enterprise will continue to grow at an alarming rate, hence the need for shifting our perception of data from expenditure to asset. Using methods such as Net Present Value, Return on Asset, and pay back, this paper will illustrate how data can be viewed as an asset rather than an expenditure. These valuations are not intended as accounting strategies, merely methods to illustrate how data shows asset characteristics. Ultimately, when data is seen as an asset, it is treated as such and stored and maintained in an information management system.


Sign in / Sign up

Export Citation Format

Share Document