66,990 research outputs found
Distributed Storage for Data Security
We study the secrecy of a distributed storage system for passwords. The
encoder, Alice, observes a length-n password and describes it using two hints,
which she then stores in different locations. The legitimate receiver, Bob,
observes both hints. The eavesdropper, Eve, sees only one of the hints; Alice
cannot control which. We characterize the largest normalized (by n) exponent
that we can guarantee for the number of guesses it takes Eve to guess the
password subject to the constraint that either the number of guesses it takes
Bob to guess the password or the size of the list that Bob must form to
guarantee that it contain the password approach 1 as n tends to infinity.Comment: 5 pages, submitted to ITW 201
Strengthening Data Security: an Holistic Approach
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards the construction of firm and resilient data and information security policies within the social science data archiving communities. While international standards can provide theoretical guidelines for the construction of such a policy, procedures need to be informed by more practical considerations. Attention is drawn to the necessity of following a holistic approach to data security, which includes the education of data creators in the reduction of disclosure risk, the integration of robust and appropriate data processing, handling and management procedures, the value of emerging technological solutions, the training of data users in data security, and the importance of management control, as well as the need to be informed by emerging government security and digital preservation standards
Secret Sharing for Cloud Data Security
Cloud computing helps reduce costs, increase business agility and deploy
solutions with a high return on investment for many types of applications.
However, data security is of premium importance to many users and often
restrains their adoption of cloud technologies. Various approaches, i.e., data
encryption, anonymization, replication and verification, help enforce different
facets of data security. Secret sharing is a particularly interesting
cryptographic technique. Its most advanced variants indeed simultaneously
enforce data privacy, availability and integrity, while allowing computation on
encrypted data. The aim of this paper is thus to wholly survey secret sharing
schemes with respect to data security, data access and costs in the
pay-as-you-go paradigm
Some Special Fields of Data Security
Our age is called information age which shows the importance of any kind of data. Because of this one should protect their (digital) data to prevent non-wanted entities accessing them.This is a permanent problem of enterprises and private persons as well. The technical prerequisites are given not only for eavesdropping the data of others but for securing our data as well. In this paper I show a possible and a low cost technical solution for a typical situation: how one can hide the digital footprints of his or her browsing the internet.SSH, portforward, privacy, data security
The Network’s Data Security Risk Analysis
Establishing the networks security risk can be a very difficult operation especially for the small companies which, from financial reasons can’t appeal at specialist in this domain, or for the medium or large companies that don’t have experience. The following method proposes not to use complex financial calculus to determine the loss level and the value of impact making the determination of risk level a lot easier.controls, risk analysis, risk level, risk management, impact, network, probability, vulnerability level.
- …