storage encryption
Recently Published Documents


TOTAL DOCUMENTS

24
(FIVE YEARS 9)

H-INDEX

3
(FIVE YEARS 1)

Author(s):  
Neeraj Kaushik ◽  
Mohammad Yawer Qadri ◽  
Himanshu Gupta

2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
Bahman A. Sassani (Sarrafpour) ◽  
Mohammed Alkorbi ◽  
Noreen Jamil ◽  
M. Asif Naeem ◽  
Farhaan Mirza

Sensitive data need to be protected from being stolen and read by unauthorized persons regardless of whether the data are stored in hard drives, flash memory, laptops, desktops, and other storage devices. In an enterprise environment where sensitive data is stored on storage devices, such as financial or military data, encryption is used in the storage device to ensure data confidentiality. Nowadays, the SSD-based NAND storage devices are favored over HDD and SSHD to store data because they offer increased performance and reduced access latency to the client. In this paper, the performance of different symmetric encryption algorithms is evaluated on HDD, SSHD, and SSD-based NAND MLC flash memory using two different storage encryption software. Based on the experiments we carried out, Advanced Encryption Standard (AES) algorithm on HDD outperforms Serpent and Twofish algorithms in terms of random read speed and write speed (both sequentially and randomly), whereas Twofish algorithm is slightly faster than AES in sequential reading on SSHD and SSD-based NAND MLC flash memory. By conducting full range of evaluative tests across HDD, SSHD, and SSD, our experimental results can give better idea for the storage consumers to determine which kind of storage device and encryption algorithm is suitable for their purposes. This will give them an opportunity to continuously achieve the best performance of the storage device and secure their sensitive data.


2020 ◽  
Vol 32 (8) ◽  
pp. 3641-3650
Author(s):  
Xiaosong Wu ◽  
Shiyu Feng ◽  
Jinghui Shen ◽  
Wei Huang ◽  
Cong Li ◽  
...  

Cloud storage services are quickly increasing and more prevalent. CSP-cloud storage providers offer storage as a service to all the users. It is a paid facility that allows association to outsource their confidential data to be stored on remote servers. But, identity privacy and preserving data from an untrusted cloud is a difficult concern, because of the successive change of the members. CSP has to be secured from an illegitimate person who performs data corruption over cloud servers. Thus, there is a need to safeguard information from the individuals who don’t have access by establishing numerous cloud storage encryption plans. Every such plan implemented expects that distributed storage suppliers are protected and can't be hacked; however, practically speaking, a few powers will compel distributed storage suppliers to render client details and secret information on the cloud, in this manner inside and out bypassing stockpiling encryption plans. In this paper, a new scheme is introduced to protect user privacy by a deniable CP_ABE(Cloud Provider_ Attribute Based Encryption) scheme which implements a cloud storage encryption plan. Since coercers cannot specify whether privileged insights are valid or not, the CSP ensures privacy of the user


2019 ◽  
Vol 5 (5) ◽  
pp. eaav8141 ◽  
Author(s):  
Nanjia Zhou ◽  
Yehonadav Bekenstein ◽  
Carissa N. Eisler ◽  
Dandan Zhang ◽  
Adam M. Schwartzberg ◽  
...  

One-dimensional (1D) nanomaterials with highly anisotropic optoelectronic properties are key components in energy harvesting, flexible electronics, and biomedical imaging devices. 3D patterning methods that precisely assemble nanowires with locally controlled composition and orientation would enable new optoelectronic device designs. As an exemplar, we have created and 3D-printed nanocomposite inks composed of brightly emitting colloidal cesium lead halide perovskite (CsPbX3, X = Cl, Br, and I) nanowires suspended in a polystyrene-polyisoprene-polystyrene block copolymer matrix. The nanowire alignment is defined by the programmed print path, resulting in optical nanocomposites that exhibit highly polarized absorption and emission properties. Several devices have been produced to highlight the versatility of this method, including optical storage, encryption, sensing, and full-color displays.


2019 ◽  
pp. 712-743
Author(s):  
Hicham Hamidine ◽  
Ausif Mahmood

Cloud Computing (CC) became one of the prominent solutions that organizations do consider to minimize and lean their information technology infrastructure cost by fully utilizing their resources. However, with all the benefits that CC promises, there are many security issues that discourage clients from making the necessary decision to easily embrace the cloud. To encourage the use of CC, clients need to be able to strategically plan their future investments without the uncertainties of security issues that come with hosting their data in the cloud. This chapter will discuss different mitigation techniques and the common proposed security algorithm schemes for data storage encryption based on classical “symmetric and asymmetric” and with an emphasis on fully homomorphic encryption schemes.


Sign in / Sign up

Export Citation Format

Share Document