Trust Level Based Data Storage and Data Access Control in a Distributed Storage Environment

被引:1
|
作者
Roos, Andreas [1 ]
Druesedow, Steffen [1 ]
Hosseini, Mahya Ilaghi [2 ]
Coskun, Goekhan [2 ]
Zickau, Sebastian [2 ]
机构
[1] Deutsch Telekom AG, Telekom Innovat Labs, D-64295 Darmstadt, Germany
[2] Tech Univ Berlin, Serv Ctr Networking, D-10587 Berlin, Germany
关键词
data storage; cloud storage; network attached storage; trustworthiness of storage solutions; privacy aware data storage;
D O I
10.1109/MobileCloud.2015.26
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In the face of enormously increasing amount of personal digital data distributed over various devices, end users are challenged to efficiently store and administrate them. Mostly, users are making use of public storage services in the cloud and local storage devices. Whereas, people with IT expertise make use of sophisticated and expensive network attached storage solutions or self-managed server solutions. Moreover, besides the pure data storage process itself, privacy aware data handling will become important in the future which enables access control to the data in order to avoid malicious access from other users, applications and / or services. For taking advantages from the benefits of the aforementioned different approaches, we advocate an integrated solution. Due to privacy concerns, the most important aspect to take into consideration in such a combined solution is trustworthiness. This paper introduces a trust level based data storage and trust level based data access control solution which changes the control process of data storage and data access. The introduced solution enables user-friendly data handling based on assigned trust levels to storage solutions in a distributed data storage environment and the classified sensitivity level of the data to be stored.
引用
收藏
页码:169 / 176
页数:8
相关论文
共 50 条
  • [1] Research on the Data Storage and Access Model in Distributed Environment
    Ren, Wuling
    Zhou, Pan
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 134 - 136
  • [2] Research on the Data Storage and Access Model in Distributed Computing Environment
    Wu, Haiyan
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 621 - 624
  • [3] Distributed Storage Algorithm for Geospatial Image Data Based on Data Access Patterns
    Pan, Shaoming
    Li, Yongkai
    Xu, Zhengquan
    Chong, Yanwen
    [J]. PLOS ONE, 2015, 10 (07):
  • [4] Distributed Storage Allocations for Neighborhood-based Data Access
    Jakovetic, Dusan
    Minja, Aleksandar
    Bajovic, Dragana
    Vukobratovic, Dejan
    [J]. 2015 IEEE INFORMATION THEORY WORKSHOP (ITW), 2015,
  • [5] Authorization of data access in distributed storage systems
    Feichtinger, D
    Peters, AJ
    [J]. 2005 6TH INTERNATIONAL WORKSHOP ON GRID COMPUTING (GRID), 2005, : 172 - 178
  • [6] Trust aware cryptographic role based access control scheme for secure cloud data storage
    Dayana, K. Roslin
    Rani, P. Shobha
    [J]. AUTOMATIKA, 2023, 64 (04) : 1072 - 1079
  • [7] Integrating Trust with Cryptographic Role-based Access Control for Secure Cloud Data Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 560 - 569
  • [8] Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (11) : 2381 - 2395
  • [9] Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 62 - 73
  • [10] The research and prospect of secure data access control in cloud storage environment
    Li, Tengfei
    Hu, Liang
    Li, Yan
    Chu, Jianfeng
    Li, Hongtu
    Han, Hongying
    [J]. Journal of Communications, 2015, 10 (10): : 753 - 759