Distributed Key Systems: Enhancing Security, Fault Tolerance and Disaster Recovery in Cloud Computing
نویسنده
چکیده
Cloud computing has increased the need for sound and sophisticated security strategies. Although encryption is the primary mechanism to provide security in data transmission, cloud computing offers both advantages and disadvantages to enhancing the encryption process. Encryption algorithms currently available are robust, but are well known and require a “key” to make a session unique. Therefore, if the key is compromised the encryption can be unlocked no matter how robust the algorithm. In the classical model, a node in a network contains the entire key, and if compromised, then potentially the entire cloud’s security could be breached. Also, if the key were destroyed then all the data it protects could be lost, because the data couldn’t be unencrypted. Therefore, splitting the key and storing portions on multiple nodes within a cloud would make it more difficult to compromise or lose the key. Further, the key could be striped (like a RAID, Redundant Array of Independent Disks) so if distributed across multiple nodes some could fail and the key could still be recovered. This methodology could create greater security, while providing greater fault tolerance by allowing retrieval of the entire key even if some nodes were compromised or destroyed.
منابع مشابه
Improving the palbimm scheduling algorithm for fault tolerance in cloud computing
Cloud computing is the latest technology that involves distributed computation over the Internet. It meets the needs of users through sharing resources and using virtual technology. The workflow user applications refer to a set of tasks to be processed within the cloud environment. Scheduling algorithms have a lot to do with the efficiency of cloud computing environments through selection of su...
متن کاملA Genetic Based Resource Management Algorithm Considering Energy Efficiency in Cloud Computing Systems
Cloud computing is a result of the continuing progress made in the areas of hardware, technologies related to the Internet, distributed computing and automated management. The Increasing demand has led to an increase in services resulting in the establishment of large-scale computing and data centers, in addition to high operating costs and huge amounts of electrical power consumption. Insuffic...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملEnhancing the Disaster Recovery Plan Through Virtualization
Currently, organizations are increasingly aware of the need to protect their computer infrastructure to maintain continuity of operations. This process involves a number of different concerns including: managing natural disasters, equipment failure, and security breaches, poor data management, inadequate design, and complex/impractical design. The purpose of this article is to delineate how vir...
متن کامل