scispace - formally typeset
Book ChapterDOI

Secure Data Archiving Using Enhanced Data Retention Policies

Reads0
Chats0
TLDR
This paper presents an efficient data management system that can archive, store and manage information effectively and eventually improves the availability, confidentiality and reduces the access latency significantly.
Abstract
With the increase in the number of applications that are deployed and executed in a cloud, cloud service providers face several maintenance related issues due to the high volume of data involved. The inability to effectively organize the information for decision making can have a serious impact on business decision making. The use of a cloud’s storage facilities for data backup and archiving provides flexibility and data preservation features at a very low cost. In this paper, we present an efficient data management system that can archive, store and manage information effectively. The massive amount of data in the cloud is grouped based on Jaccard Similarity into six different buckets. Two sets of data retention policies are proposed for the cloud archive framework. These policies are applied to each of the buckets individually to identify the data to be archived. Additionally, homomorphic encryption is applied to provide a level of security to the data to be archived. This data is archived into the cloud to provide a data storage environment as a service that is optimized for long term data retention, security and that is compliant with the data retention policy. This framework eventually improves the availability, confidentiality and reduces the access latency significantly.

read more

Citations
More filters
Journal ArticleDOI

A residue-based approach for resource provisioning by horizontal scaling across heterogeneous clouds

TL;DR: This work proposes a novel residue-based resource provisioning technique for a cloud to perform horizontal scaling by splitting a request dynamically based on the resource availability in itself and in the clouds with which it inter-operates.
Journal ArticleDOI

Enhancing the Cloud Inter-operation Toolkit (CIT) to Support Multiple Cloud Service Models

TL;DR: This work aims to improve the security measures in such an environment and to further optimize the resources and time consumed to establish the environment, and enhances CIT to support multiple cloud service models, thereby making it superior to all other existing inter-cloud facilitating approaches.
Journal ArticleDOI

Archiving and Document Management at Taibah University: A Case Study

TL;DR: A qualitative descriptive case study has been conducted to examine how digital archiving and document management are organised at Taibah University to address the needs of researchers, professors, administrators and students as well as to guarantee secure storage of and access to data.
Posted Content

Implementation of Security Features in Software Development Phases.

TL;DR: In this paper, the authors discuss how secure software development can be performed and discuss the implementation of security features during software development process, which is expected that this paper will be a contribution towards the aforementioned software security domain which is often ignored during practical application.
References
More filters
Book ChapterDOI

Evaluating 2-DNF formulas on ciphertexts

TL;DR: A homomorphic public key encryption scheme that allows the public evaluation of ψ given an encryption of the variables x1,...,xn and can evaluate quadratic multi-variate polynomials on ciphertexts provided the resulting value falls within a small set.
Proceedings ArticleDOI

An artificial intelligence perspective on autonomic computing policies

TL;DR: A unified framework that interrelates three different types of policies that will be used in autonomic computing system: action, goal, and utility function policies is introduced.
Journal ArticleDOI

Cloud Computing and Information Policy: Computing in a Policy Cloud?

TL;DR: The nature and potential of cloud computing, the policy issues raised, and research questions related to cloud computing and policy are examined as a part of larger issues of public policy attempting to respond to rapid technological evolution.

Homomorphic Encryption Applied to the Cloud Computing Security

TL;DR: This paper is proposing an application of a method to execute operations on encrypted data without decrypting them which will provide the same results after calculations as if the authors have worked directly on the raw data.
Proceedings ArticleDOI

A medical image archive solution in the cloud

TL;DR: A prototype system was implemented to study some of the problems faced for long-term medical image archive on one of the industry leading cloud computing platform, Microsoft Windows Azure, and found it an ideal platform to develop and deploy this kind of service oriented applications.
Related Papers (5)