Security of Data Fragmentation and Replication over Un-trusted Hosts
نویسندگان
چکیده
Data replication technique is used to avoid the fault tolerance and improve the performance .With this initiation of content delivery networks, it is becoming more and more frequent that data content is placed on hosts that are not directly controlled by the content owner, and due to this, to ensure the data integrity ,security mechanism are needed. In this paper we present a system architecture that allows arbitrary queries to be supported on data content replicated over un-trusted servers. To prevent these servers from returning incorrect answers to client, we make use of a small number of trusted hosts that randomly check these answers and take corrective action whenever required. Additionally, our system will use an audit mechanism that guarantees that any un-trusted server acting maliciously will finally be detected and excluded from the system so that the consistency can be maintained.
منابع مشابه
Secure Data Replication over Untrusted Hosts
Data replication is a widely used technique for achieving fault tolerance and improved performance. With the advent of content delivery networks, it is becoming more and more frequent that data content is placed on hosts that are not directly controlled by the content owner, and because of this, security mechanisms to protect data integrity are necessary. In this paper we present a system archi...
متن کاملDesign and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper describes the security architecture for Globe, an objectbased middleware specifically designed to support dynamic replication of services over wide-area networks. Replication introduces a series of new security issues, ...
متن کاملA Framework for Smart Trusted Indicators for Browsers (STIB)
Web browsers currently have security indicators which provide security features that notify users of malicious or un-trusted websites. Most of these security indicators are normally synced with some black list data base that has a list with known websites that are known to be malicious. When a user surfs a website that is identified in the black list data base, the security indicators then noti...
متن کاملDesign of a Secure and Fault Tolerant Environment for Distributed Storage
We discuss the design and evaluation of a secure and fault tolerant storage infrastructure for un-trusted distributed computing environments. Previous designs of storage systems for this space have tended to use decoupled mechanisms for achieving fault tolerance and security. Our design, based on cryptographic properties of error-correction odes, combines redundancy (for fault tolerance) and en...
متن کاملAn Improved End to End System for Sharing and Managing Data in Cloud Storage
Cloud Computing is one of the emerging area in modern times. It is providing excellent facilities due to its adaptable infrastructure and features, but the issues related to trust management and security are key challenges in various applications. Whenever data or information is shared or transmitted from one host to another in cloud storage there is a need for security and trust assurances to ...
متن کامل