• Title/Summary/Keyword: Secured data storage

Search Result 24, Processing Time 0.025 seconds

DNA Based Cloud Storage Security Framework Using Fuzzy Decision Making Technique

  • Majumdar, Abhishek;Biswas, Arpita;Baishnab, Krishna Lal;Sood, Sandeep K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3794-3820
    • /
    • 2019
  • In recent years, a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability is much needed. This study presents a cloud storage framework, wherein a 128-bit encryption key has been generated by combining deoxyribonucleic acid (DNA) cryptography and the Hill Cipher algorithm to make the framework unbreakable and ensure a better and secured distributed cloud storage environment. Moreover, the study proposes a DNA-based encryption technique, followed by a 256-bit secure socket layer (SSL) to secure data storage. The 256-bit SSL provides secured connections during data transmission. The data herein are classified based on different qualitative security parameters obtained using a specialized fuzzy-based classification technique. The model also has an additional advantage of being able to decide on selecting suitable storage servers from an existing pool of storage servers. A fuzzy-based technique for order of preference by similarity to ideal solution (TOPSIS) multi-criteria decision-making (MCDM) model has been employed for this, which can decide on the set of suitable storage servers on which the data must be stored and results in a reduction in execution time by keeping up the level of security to an improved grade.

An Efficient and Secure Data Storage Scheme using ECC in Cloud Computing (클라우드 컴퓨팅에서 ECC 암호를 적용한 안전한 데이터 스토리지 스킴)

  • Yin, XiaoChun;Thiranant, Non;Lee, HoonJae
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.49-58
    • /
    • 2014
  • With the fast development of internet, cloud computing has become the most demanded technology used all over the world. Cloud computing facilitates its consumers by providing virtual resources via internet. One of the prominent services offered in cloud computing is cloud storage. The rapid growth of cloud computing also increases severe security concerns to cloud storage. In this paper, we propose a scheme which allows users not only securely store and access data in the cloud, but also share data with multiple users in a secured way via unsecured internet. We use ECC for cryptography and authentication operation which makes the scheme work in a more efficient way.

Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System

  • Mnyawi, Richard;Kombe, Cleverence;Sam, Anael;Nyambo, Devotha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.364-374
    • /
    • 2022
  • Health information systems (HIS) are facing security challenges on data privacy and confidentiality. These challenges are based on centralized system architecture creating a target for malicious attacks. Blockchain technology has emerged as a trending technology with the potential to improve data security. Despite the effectiveness of this technology, still HIS are suffering from a lack of data privacy and confidentiality. This paper presents a blockchain-based data storage security architecture integrated with an e-Health care system to improve its security. The study employed a qualitative research method where data were collected using interviews and document analysis. Execute-order-validate Fabric's storage security architecture was implemented through private data collection, which is the combination of the actual private data stored in a private state, and a hash of that private data to guarantee data privacy. The key findings of this research show that data privacy and confidentiality are attained through a private data policy. Network peers are decentralized with blockchain only for hash storage to avoid storage challenges. Cost-effectiveness is achieved through data storage within a database of a Hyperledger Fabric. The overall performance of Fabric is higher than Ethereum. Ethereum's low performance is due to its execute-validate architecture which has high computation power with transaction inconsistencies. E-Health care system administrators should be trained and engaged with blockchain architectural designs for health data storage security. Health policymakers should be aware of blockchain technology and make use of the findings. The scientific contribution of this study is based on; cost-effectiveness of secured data storage, the use of hashes of network data stored in each node, and low energy consumption of Fabric leading to high performance.

A Study on the Design Guidelines of a Storage for Conservation of Relics in a Museum (문화재 보존을 위한 박물관 수장고의 공간계획 지침 연구)

  • Jung Sung-Wook
    • Korean Institute of Interior Design Journal
    • /
    • v.15 no.3 s.56
    • /
    • pp.144-154
    • /
    • 2006
  • Except the time when relics of a museum are exhibited or loaned to the public, they are stored in a storage. In addition, it is common view that collections are exhibited a few of total stored collections in a museum. Therefore, the environmental condition of a storage is an important factor. Hereby, the purpose of this study is to suggest the design guidelines of a storage for conservation of relics in a museum. The results from this study are as follows briefly. First, location of storages has to be located and centralized above ground against preservation environment and additional renovation. Second, for storage size, It is reasonable to secure long-term experimental data after planning about 20% of whole section in present domestic situation. Third, in order to prevent environmental deterioration due to short storage floor space, adequate storage height has to be secured against a mezzanine deck and spare storages need to be planned. Where a mezzanine deck is designed, detailed plans have to be supported for equal micro climate in a storage. Fourth, in respect of environmental control of storages, finish materials with adjustment ability on relative humidity have to be used after the system is installed jointly direct and indirect way by air chamber, considering domestic condition for management of intermittent ventilation.

Design and Structural Safety Evaluation of the High Burn-up PWR Spent Nuclear Fuel for Storage Cask

  • Taehyung Na;Youngoh Lee;Yeji Kim;Donghee Lee;Taehyeon Kim;Kiyoung Kim;Yongdeog Kim
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.22 no.2
    • /
    • pp.201-210
    • /
    • 2024
  • Because most spent nuclear fuel storage casks have been designed for low burnup fuel, a safety-significant high burnup dry storage cask must be developed for nuclear facilities in Korea to store the increasing high burnup and damaged fuels. More than 20% of fuels generated by PWRs comprise high burnup fuels. This study conducted a structural safety evaluation of the preliminary designs for a high burnup storage cask with 21 spent nuclear fuels and evaluated feasible loading conditions under normal, off-normal, and accident conditions. Two types of metal and concrete storage casks were used in the evaluation. Structural integrity was assessed by comparing load combinations and stress intensity limits under each condition. Evaluation results showed that the storage cask had secured structural integrity as it satisfied the stress intensity limit under normal, off-normal, and accident conditions. These results can be used as baseline data for the detailed design of high burnup storage casks.

The Development of Compressive Strength Estimation Equation for LNG Storage Tank using Rebound Hardness Method (반발경도법을 이용한 LNG 저장탱크 콘크리트의 압축강도 추정식 개발)

  • Kim, Jung-Hoon;Kim, Young-Gu;Jo, Young-Do
    • Journal of the Korean Institute of Gas
    • /
    • v.21 no.3
    • /
    • pp.26-32
    • /
    • 2017
  • Outer tank concretes of LNG storage tank are composed of prestressed concrete structures that act as a protective wall. The danger such as the collapse of structures will exist if concrete structures is not secured due to the deterioration. Concrete compressive strength directly related to the safety of structures can be predicted by using estimation equation of compressive strength through rebound hardness test and ultrasonic wave velocity method. But, there is no the estimation equation of LNG storage tank for a relation between NDT data and real strength. In this study, to obtain more accurate real strengths for LNG storage tank, core specimens were sampled from walls of pilot LNG storage tank. The rebound hardness test of general NDT for concrete structures was carried out at each 3 positions for the four areas. The compressive strength estimation equation of LNG storage tank was developed by using the data for rebound hardness test of pilot LNG storage tank and compressive strength test of sampled concrete cores.

A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems (신뢰할 수 없는 DRM 클라이언트 시스템 하에서 키 보호를 위한 Secure Storage Device의 연구)

  • 이기정;권태경;황성운;윤기송
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.3-13
    • /
    • 2004
  • DRM is the ability to brand digital contents with features that ensure copy Protection and affect the way in which digital contents are played back. DRM is a technology that enables the secure distribution, promotion and sale of digital contents on the Internet. The DRM Client System that operates on the untrusted user environments has to meet the requirements of the contents owner, including copyright and contents protection. After the DRM Client System is installed on the untrusted user environments, it verifies and plays digital contents. With these procedures it cuties out user authentication, contents decryption, and license management. During these procedures, the sensitive data, including authentication information, decryption data and license data, must be secured against any illegal access from users. The goal of this thesis is to introduce the implementation of Secure Storage Device which can protect user's authentication key, cryptographic key, and license data in safe where the DRM Client System is running.

Improvement of Asymmetric Dual Lens Actuator with slim thickness (비대칭 형상을 갖는 슬림형 듀얼 렌즈 액추에이터의 개선)

  • Woo, Jung-Hyun;Lim, Jea-Kyung;Yoon, Jun-Ho;Park, No-Cheol;Park, Young-Pil;Park, Kyoung-Su
    • Transactions of the Society of Information Storage Systems
    • /
    • v.7 no.1
    • /
    • pp.13-18
    • /
    • 2011
  • As a standard of optical disk drive (ODD) was determined to Blu-ray diks (BD), researches for securing slim drive thickness, high data transfer rate and high capacity have been progressed. The actuator for applying BD is also required to have high performances, such as compatibility, slim thickness and 3-axis motion. In this paper, an asymmetric dual lens actuator is proposed to satisfy abovementioned performances. To design the actuator in a limited space, stress analysis and design of experiment (DOE) are performed to reduce weight of moving part and increase driving force and flexible mode frequency. Consequently, the final model, which is satisfied with specifications, is secured.

Selective Encryption Algorithm for Vector Map using Geometric Objects in Frequency Domain

  • Pham, Ngoc-Giao;Kwon, Ki-Ryong;Lee, Suk-Hwan;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1312-1320
    • /
    • 2017
  • Recently, vector map data is developed and used in many domains widely. In the most cases, vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the production process of vector maps is considerably complex and consumes a lot of money and human resources. Therefore, the secured storage and transmission are necessary to prevent the illegal copying and distribution from hacker. This paper presents a selective encryption algorithm using geometric objects in frequency domain for vector map data. In the proposed algorithm, polyline and polygon data in vector map is the target of the selective encryption process. Experimental results verified that proposed algorithm is effectively and adaptive the requirements of security.

Fusion of Blockchain-IoT network to improve supply chain traceability using Ethermint Smart chain: A Review

  • George, Geethu Mary;Jayashree, LS
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3694-3722
    • /
    • 2022
  • In today's globalized world, there is no transparency in exchanging data and information between producers and consumers. However, these tasks experience many challenges, such as administrative barriers, confidential data leakage, and extensive time delays. To overcome these challenges, we propose a decentralized, secured, and verified smart chain framework using Ethereum Smart Contract which employs Inter Planetary File Systems (IPFS) and MongoDB as storage systems to automate the process and exchange information into blocks using the Tendermint algorithm. The proposed work promotes complete traceability of the product, ensures data integrity and transparency in addition to providing security to their personal information using the Lelantos mode of shipping. The Tendermint algorithm helps to speed up the process of validating and authenticating the transaction quickly. More so in this time of pandemic, it is easier to meet the needs of customers through the Ethermint Smart Chain, which increases customer satisfaction, thus boosting their confidence. Moreover, Smart contracts help to exploit more international transaction services and provide an instant block time finality of around 5 sec using Ethermint. The paper concludes with a description of product storage and distribution adopting the Ethermint technique. The proposed system was executed based on the Ethereum-Tendermint Smart chain. Experiments were conducted on variable block sizes and the number of transactions. The experimental results indicate that the proposed system seems to perform better than existing blockchain-based systems. Two configuration files were used, the first one was to describe the storage part, including its topology. The second one was a modified file to include the test rounds that Caliper should execute, including the running time and the workload content. Our findings indicate this is a promising technology for food supply chain storage and distribution.