{"title":"Performance analysis of implicit security mechanisms for cloud storage system","authors":"Makhan Singh, Sarbjeet Singh","doi":"10.1109/RAECS.2015.7453416","DOIUrl":null,"url":null,"abstract":"Cloud Computing is considered as next generation architecture of computing. It is the collection of interconnected servers which are provisioned dynamically on demand for execution of applications. The data stored in servers of datacenters of cloud system is generally protected through firewalls and encryption techniques. These techniques come under explicit security mechanisms. In this paper, implicit security mechanisms like Information Dispersal Algorithms and secret sharing schemes have been analyzed which provide implicit data security, reliability and availability to information. The paper also presents the performance analysis of various Information Dispersal Algorithms on the basis of their storage, availability, redundancy and security features.","PeriodicalId":256314,"journal":{"name":"2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAECS.2015.7453416","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cloud Computing is considered as next generation architecture of computing. It is the collection of interconnected servers which are provisioned dynamically on demand for execution of applications. The data stored in servers of datacenters of cloud system is generally protected through firewalls and encryption techniques. These techniques come under explicit security mechanisms. In this paper, implicit security mechanisms like Information Dispersal Algorithms and secret sharing schemes have been analyzed which provide implicit data security, reliability and availability to information. The paper also presents the performance analysis of various Information Dispersal Algorithms on the basis of their storage, availability, redundancy and security features.