DocumentCode :
497922
Title :
Efficient security for Desktop Data Grid using cryptographic protocol
Author :
Vaishnavi, R. ; Anand, Jose ; Janarthanan, R.
Author_Institution :
Dept. of Inf. Technol., Anna Univ., Chennai, India
fYear :
2009
fDate :
4-6 June 2009
Firstpage :
1
Lastpage :
6
Abstract :
Security is the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of some particular purpose. Data security ensures that kind of private and sensitive data from corruption and the access to it is suitably controlled. Enterprise businesses and government agencies around the world face the certainty of losing sensitive data from crashed devices. This drives the need for a complete data protection solution that secures data on all common platforms, deploys easily, scales to any size organization and meets strict compliance requirements related to privacy laws and regulations. The reliability and data assurance at adverse conditions is the requirement of this century. Particularly in the paradigm of ldquovolunteer computingrdquo which is a specific type of distributed system, where shared resources are provided in a volunteer fashion by the clients of the desktop data grid system. In this paper, we propose an architecture for the desktop data grids with a centralized server which increases the performance of the system and reduces the complexity of the server. The efficiency of the system not only depends on the security level of the client but also considers the sensitivity of the data being stored in the system. Altogether a simple metric termed fragmentation factor (FF) is proposed in this system which considers both the security of the client and the sensitivity of the data. The erasure tornado codes are applied to cope up with unreliable data storage components in the distributed data grid systems. The enhanced levels of security can be achieved in the corporate environment by imposing security auditing. To ensure the security of the various servers and systems, the security has to be assessed through proper audit tools.
Keywords :
authorisation; client-server systems; computational complexity; cryptographic protocols; data privacy; grid computing; resource allocation; FF; centralized server; complexity reduction; corporate environment; cryptographic protocol; data assurance; data security; desktop data grid; distributed system; erasure tornado code; fragmentation factor; privacy law; security auditing; shared resource; unauthorized person prevention; unreliable data storage component; volunteer computing; Computer architecture; Computer crashes; Cryptographic protocols; Data privacy; Data security; Distributed computing; Government; Grid computing; Information security; Protection; Client/server; attacks; centralized server; fragmentation factor; grid; login; security; web-based services;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Control, Automation, Communication and Energy Conservation, 2009. INCACEC 2009. 2009 International Conference on
Conference_Location :
Perundurai, Tamilnadu
Print_ISBN :
978-1-4244-4789-3
Type :
conf
Filename :
5204488
Link To Document :
بازگشت