Efficient Security for Desktop Data Grid using Cryptographic Protocol

被引:0
|
作者
Vaishnavi, R. [1 ]
Anand, Jose [2 ]
Janarthanan, R. [1 ]
机构
[1] Anna Univ, Dept Informat Technol, Jaya Engn Coll, Madras 600025, Tamil Nadu, India
[2] Anna Univ, Dept Elect & Commun Engn, Jaya Engn Coll, Madras 600025, Tamil Nadu, India
关键词
attacks; Client/server; centralized server; fragmentation factor; grid; login; security; web-based services; POLICY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of some particular purpose. Data security ensures that kind of private and sensitive data from corruption and the access to it is suitably controlled. Enterprise businesses and government agencies around the world face the certainty of losing sensitive data from crashed devices. This drives the need for a complete data protection solution that secures data on all common platforms, deploys easily, scales to any size organization and meets strict compliance requirements related to privacy laws and regulations. The reliability and data assurance at adverse conditions is the requirement of this century. Particularly in the paradigm of "Volunteer Computing" which is a specific type of distributed system, where shared resources are provided in a volunteer fashion by the clients of the Desktop Data Grid System. In this paper, we propose an architecture for the desktop data grids with a centralized server which increases the performance of the system and reduces the complexity of the server. The efficiency of the system not only depends on the security level of the client but also considers the sensitivity of the data being stored in the system. Altogether a simple metric termed Fragmentation Factor (FF) is proposed in this system which considers both the security of the client and the sensitivity of the data. The erasure tornado codes are applied to cope up with unreliable data storage components in the distributed data grid systems. The enhanced levels of security can be achieved in the corporate environment by imposing Security Auditing. To ensure the security of the various servers and systems, the security has to be assessed through proper audit tools.
引用
收藏
页码:305 / +
页数:3
相关论文
共 50 条
  • [1] Providing security to the Desktop Data Grid
    Luna, Jesus
    Flouris, Michail
    Marazakis, Manolis
    Bilas, Angelos
    2008 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-8, 2008, : 2779 - 2786
  • [2] Efficient Queue and GSI Security Management Framework for Mobile Desktop Grid
    Sarwar, Muhammad Imran
    Osman, Mohamad Azam
    DFMA 2008: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS & APPLICATIONS, PROCEEDINGS, 2008, : 84 - 88
  • [3] Efficient Data Security Method to Control Data in Cloud Storage System using Cryptographic Techniques
    Prakash, G. L.
    Prateek, Manish
    Singh, Inder
    2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [4] Efficient Cryptographic Access Control Protocol for Sensitive Data Management
    Yan, Xixi
    Geng, Tao
    Ding, Haiyang
    JOURNAL OF COMPUTERS, 2014, 9 (01) : 222 - 227
  • [5] Improving the Security of Cryptographic Protocol Standards
    Basin, David
    Cremers, Cas
    Miyazaki, Kunihiko
    Radomirovic, Sasa
    Watanabe, Dai
    IEEE SECURITY & PRIVACY, 2015, 13 (03) : 24 - 31
  • [6] USB LEVEL DATA SECURITY USING CRYPTOGRAPHIC APPROACH
    Sharma, Rahul
    Sarda, Hitesh
    Bhattacharjee, Tanisha
    Roy, Aiswarya
    Bhattacharya, Prithwiswar
    Chowdhury, Sugata
    Mallick, Shankhadip
    Sengupta, Tapapriya
    Banerjee, Jayati
    Roy, Priyodarshini
    Sarker, Siddhartha
    Chakraborty, Subhasree
    Bal, Sauvik
    Das, Rupayan
    Nayak, Somen
    2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 861 - 865
  • [7] An Efficient Security Protocol for Advanced Metering Infrastructure in Smart Grid
    Yan, Ye
    Hu, Rose Qingyang
    Das, Sajal K.
    Sharif, Hamid
    Qian, Yi
    IEEE NETWORK, 2013, 27 (04): : 64 - 71
  • [8] A SURVEY ON EFFICIENT CRYPTOGRAPHIC APPROACH FOR DATA SECURITY IN WIRELESS SENSOR NETWORKS
    Ilakkiya, S.
    Mailsamy, M.
    Britto, J. Gladson Maria
    IIOAB JOURNAL, 2016, 7 (09) : 709 - 715
  • [9] Smart grid security with cryptographic chip integration
    Kumar A.
    Vishnoi P.
    Shimi S.L.
    EAI Endorsed Transactions on Energy Web, 2019, 19 (23)
  • [10] A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators
    Puckett, Steven
    Liu, Jianqing
    Yoo, Seong-Moo
    Morris, Thomas H.
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (24) : 22143 - 22152