scholarly journals Perceptions About Data Security For Portable Storage Devices

2012 ◽  
Vol 5 (1) ◽  
pp. 1-18
Author(s):  
Cynthia L. Knott ◽  
G. Steube

The importance of securing data and information is a critical issue in todays world. These are no longer stored on a central system that is easy to protect and secure. Now everyone carries around small storage devices, which make guaranteeing that the information is guarded is much more complex and uncertain. This paper builds on the previous research of Knott & Steubes in the paper Encryption and Portable Data Storage, to be published in the Spring of 2011. In the previous work we identified the potential security issues that arise from using a portable storage device such as a USB flash drive. TrueCrypt software was introduced as an option that allows users to encrypt and hide data. The TrueCrypt software, which is publically available, is particularly useful for safeguarding data on USB flash drives that are easily compromised. A survey of undergraduate students was administered which focused on their practices and attitudes about security. It was found that there were strong associations between the use of flash drives, security, and the use of passwords.

2014 ◽  
Vol 701-702 ◽  
pp. 1106-1111 ◽  
Author(s):  
Xin Zheng Zhang ◽  
Ya Juan Zhang

As information and processes are migrating to the cloud, Cloud Computing is drastically changing IT professionals’ working environment. Cloud Computing solves many problems of conventional computing. However, the new technology has also created new challenges such as data security, data ownership and trans-code data storage. We discussed about Cloud computing security issues, mechanism, challenges that Cloud service providers and consumers face during Cloud engineering. Based on concerning of security issues and challenges, we proposed several encryption algorithms to make cloud data secure and invulnerable. We made comparisons among DES, AES, RSA and ECC algorithms to find combinatorial optimization solutions, which fit Cloud environment well for making cloud data secure and not to be hacked by attackers.


Cloud Computing is a very viable data storage structure where the users can store and access the data from anywhere. Cloud computing use is increasing at a very rapid pace nowadays. But as cloud allows us data accessibility quite easily data security is a major concern and is an emerging area of study. Other issues related to cloud computing are data privacy and internet dependency. On the other cloud computing also has wide range of benefits over traditional storage and accessibility environment such as scalability, flexibility and resource utilization. We have worked in the area of mobile cloud computing to analyse and solve the problems of anomaly attacks. Our work focuses on preventing the adaptive anomaly attacks and some other security issues of cloud computing


2018 ◽  
Vol 7 (4.7) ◽  
pp. 200
Author(s):  
Iskandar N. Nasyrov ◽  
Ildar I. Nasyrov ◽  
Rustam I. Nasyrov ◽  
Bulat A. Khairullin

The problem of SMART-data ambiguity in different models of hard disk drives of the same manufacturers is considered. This circumstance creates obstacles for the use of SMART technology when assessing and predicting the reliability of storage devices. The scientific task of the work is to study the dependence of the hard disk failure probability on the reliability parameters values for each individual storage device of any model of any manufacturer. In the course of the study, two interrelated parameters were analyzed: “5 Reallocated sectors count” and “9 Power-on hours” (the number of hours spent in the on state). As a result of the analysis, two types of dependences were revealed: drooping and dome shaped. The first means the maximum failure frequency of information storage devices immediately after commissioning, the second - after a certain period of time, actually coinciding with the warranty period for the products (two years). With the help of clustering in plane according to the coordinates of the number of reallocated sectors and the time of operation, two different reasons for the failure of the drives were discovered: due to deterioration of the disk surface and due to errors in the positioning of the read / write heads. Based on the variety of types of causes and consequences of equipment failure, the task of individual assessment of an individual data storage device reliability is proposed to be solved using several parameters simultaneously.  


In recent years, with the widespread application of cloud computing, more and more enterprises, institutions, and individuals have started to use cloud services to place their data in the cloud. With the rise of cloud services, the accompanying data security issues have received increasing attention. Because data stores are in the cloud, there are many outstanding security issues. This paper proposes a public cloud data security solution based on a trusted third-party platform. The solution is based on an independent and trusted third-party platform, and has certain advantages in data encryption, key management, data awareness, data sharing, and accident responsibility.


Author(s):  
Musa Mikailovich Lyanov

This article is dedicated to definition of the term virtual traces in forensics. The author determined the peculiarities of virtual traces, which allowed giving definition to the traces on digital data storage devices. It is noted, the forensic science does not have a universal terminology for definition of traces left as a result of cybercrimes. Solution of this problem remains extremely important, as it would assist the advancement of the theory and practice of forensics in the indicated field. The author analyzed the case law for the purpose of determining peculiarities of utilization of terminology to describe traces detected in the course of studying digital data storage devices. The conclusion is made that most common and suitable term is “virtual traces”. The definition of the concept in questions was proposed leaning on the analysis of peculiarities of virtual traces and mechanism of their emergence on digital data storage devices. Thus, virtual trace is determined as varied in structure, special type of material traces that exists within the limits of digital data storage device and directly tied with it, as well as can be decoded only using special software and technical means.


2013 ◽  
Vol 846-847 ◽  
pp. 1595-1599
Author(s):  
Xiao Ping Xu ◽  
Jun Hu Yan ◽  
Lan Liu

With the application of cloud computing, in data storage, data management, and more widely, how to ensure that cloud computing data security is becoming an important research direction. This paper analyzes the cloud computing data security issues, discusses the cloud computing data security technologies, and proposes a cloud data security solution and the corresponding security mechanism.


Author(s):  
Jockie P Sagala ◽  
Ika Candradewi ◽  
Agus Harjoko

Some cases the recording data of Closed Circuit Television (CCTV) is stored for future use. In the long term usage, the files size will grow larger and requiring large storage devices. In some cases, the recorded data not only image with the desired object but also the background images that may be recorded for long periods of time. This cases make data storage device usage to be less effective. So this research will design a system of CCTV devices that capable to select images to reduce the size of stored images data by image processing.The images selection of this system is based on based on adaptive median algorithm. When any object get detected, the images data to be saved is current input frame. Otherwise, the data to be saved is background model image. Background model on this system is adapted with the change visual data of background image.The results obtained from this research in the form of a CCTV system that are able to select recording data to be stored with image processing. The background model will be kept adapting with background visual data changes.


Author(s):  
Anitha K L ◽  
T.R. Gopalakrishnan Nair

<span>The cloud computing had its impact far and wide, and Enterprise solutions are getting migrated to different types of clouds. The services are delivered from the data centers which are located all over the world. As the data is roaming with less control in any data centers, data security issues in cloud are very challenging. Therefore we need multi-level authentication, data integrity, privacy and above all encryption to safeguard our data which is stored on to the cloud. The data and applications cannot be relocated to a virtual server without much degree of security concern as there can be much confidential data or mission-critical applications. In this paper, we propose Data Storage Lock Algorithm (DSLA) to store confidential data thereby provides secure data storage in cloud computing based on cryptographic standards.</span>


2013 ◽  
Vol 325-326 ◽  
pp. 1661-1664
Author(s):  
Wen Ying Zeng ◽  
Yue Long Zhao

The mobile storages especially in mobile devices hold a lot of important and private data. The portability and mobility may lead to loss and theft, therefore security problem of mobile storages and mobile data may suffer from troublesome and damage. TCG provides TPM for trust and security management. It is insufficient with mobile storage devices because mobile storage devices are often separated and load with heterogeneity and massive data. The paper analyzes the security management of mobile storages, proposed practical mobile storage and data security management methods and mechanisms, and illustrates mobile storages integration schemes for single storage device and multiple storages devices and cloud storage. The overall mobile storage and data security policies and methods should be performed urgently.


Author(s):  
I. N. Podvolotskiy

The paper discusses the promising trends of a preliminary study of a person’s appearance captured using video recording devices. A characteristic of the preliminary study of the portrait data storage device seized during the inspection of the accident location is a sequential study of their external characteristics and internal content in order to further solve diagnostic problems aimed at establishing the characteristics of the surveying, image quality, and lack of signs of changing the initial content of the video or photo image. To date, the possibility of diagnosing human characteristics by age, physique, clothing, and manner of walking is being studied. According to the results of the analysis of scientific literature and practical activities of experts, it can be concluded that it is necessary to improve the methodology of portrait examination by including computer technologies for studying surveying parameters and signs of possible interference with the recording integrity. At the same time, to effectively identify the characteristics and states of people’s appearance transmitted by means of modern storage devices of portrait images, it is important that a team of experts conduct a comprehensive study of the images taking into account the knowledge in anatomy, anthropology, forensic medicine, computer technology, mathematical modeling, etc.


Sign in / Sign up

Export Citation Format

Share Document