scholarly journals APPLICATION OF THE SECRET SEPARATION ALGORITHM IN DATA TRANSMISSION AND STORAGE SYSTEMS

2021 ◽  
Vol 8 (1) ◽  
pp. 050-058
Author(s):  
D. A. SAGAYDAK ◽  

The possibility of using the secret sharing scheme for secure information exchange in data transmission and storage systems is given. Variants of 1) demultiplexing of transmitted data over two communication channels with different bandwidths are proposed, when a smaller part of information is transmitted over a closed communication channel with a lower capital capacity, and through an open channel with a higher bandwidth, most of the information; 2) distributed storage of data using the services of data processing centers, when not all information is transferred to storage, but some of its large part, which cannot be used to restore the original information.

2018 ◽  
Vol 7 (2.32) ◽  
pp. 315
Author(s):  
V Naresh ◽  
M Anudeep ◽  
M Saipraneeth ◽  
A Saikumar Reddy ◽  
V Navya

The cloud stockpiling framework, comprising of capacity servers, gives long haul stockpiling administrations on the Internet. Maintaining the data in the cloud computing of third parties generates: serious concern about the confidentiality of data and the reduction of data management costs. Nonetheless, we should give security certifications to outside information. We plan and actualize a protected cloud stockpiling framework that gives secure, secure and available record security for document administration and secure information exchange. It includes foreign files with a file access policy, possibly deleting files, to avoid being denied to anyone with a file access policy. To achieve these security objectives, a set of password keys is implemented that maintain a host (s) or head (s) separately. We offer a twofold edge intermediary coding plan and incorporate it with a decentralized disposal code, which is detailed with a safely Cloud storage framework. The Cloud storage system not only provides a secure and stable search and storage of data, but also allows the user to transfer their data to the user of the backup to another user without the data being returned.  


Author(s):  
Rossano Gaeta ◽  
Marco Grangetto

In coding-based distributed storage systems (DSSs), a set of storage nodes (SNs) hold coded fragments of a data unit that collectively allow one to recover the original information. It is well known that data modification (a.k.a. pollution attack) is the Achilles’ heel of such coding systems; indeed, intentional modification of a single coded fragment has the potential to prevent the reconstruction of the original information because of error propagation induced by the decoding algorithm. The challenge we take in this work is to devise an algorithm to identify polluted coded fragments within the set encoding a data unit and to characterize its performance. To this end, we provide the following contributions: (i) We devise MIND (Malicious node IdeNtification in DSS), an algorithm that is general with respect to the encoding mechanism chosen for the DSS, it is able to cope with a heterogeneous allocation of coded fragments to SNs, and it is effective in successfully identifying polluted coded fragments in a low-redundancy scenario; (ii) We formally prove both MIND termination and correctness; (iii) We derive an accurate analytical characterization of MIND performance (hit probability and complexity); (iv) We develop a C++ prototype that implements MIND to validate the performance predictions of the analytical model. Finally, to show applicability of our work, we define performance and robustness metrics for an allocation of coded fragments to SNs and we apply the results of the analytical characterization of MIND performance to select coded fragments allocations yielding robustness to collusion as well as the highest probability to identify actual attackers.


2020 ◽  
pp. 102-109
Author(s):  
D.KH. DOMULLODZHANOV ◽  
◽  
R. RAHMATILLOEV

The article presents the results of the field studies and observations that carried out on the territory of the hilly, low-mountain and foothill agro landscapes of the Kyzylsu-yuzhnaya (Kyzylsu-Southern) River Basin of Tajikistan. Taking into account the high-altitude location of households and the amount of precipitation in the river basin, the annual volumes of water accumulated with the use of low-cost systems of collection and storage of precipitation have been clarified. The amount of water accumulated in the precipitation collection and storage systems has been established, the volume of water used for communal and domestic needs,the watering of livestock and the amount of water that can be used to irrigate crops in the have been determined. Possible areas of irrigation of household plots depending on the different availability of precipitation have been determined. It has been established that in wet years (with precipitation of about 10%) the amount of water collected using drip irrigation will be sufficient for irrigation of 0.13 hectares, and in dry years (with 90% of precipitation) it will be possible to irrigate only 0.03 ha of the household plot. On the basis of the basin, the total area of irrigation in wet years can be 4497 ha, and in dry years only 1087 ha. Taking into account the forecasts of population growth by 2030 and an increase in the number of households, the total area of irrigation of farmlands in wet years may reach 5703 hectares,and in dry years – 1379 hectares. Growing crops on household plots under irrigation contributes to a significant increase in land productivity and increases the efficiency of water use of the Kyzylsu-yuzhnaya basin.


Author(s):  
Nayab Sheikh ◽  
Muhammad Bilal Tahir ◽  
Nisar Fatima ◽  
Muhammad Sagir ◽  
Muhammad Pervaiz ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document