Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Data Storage in Distributed Database Systems

T. Sudalai Muthu, G. Vasanth, Rukmini Durgale, Suresh Babu

Abstract


The number of Internet connected PCs is projected to reach 1 billion by 2015, which means several PetaFLOPS of computing power and a storage capacity around one Exabyte able to exceed the one provided by any centralized system. But at the same time the amount of memory needs for the Organization is also increasing day by day for its various needs. Tapping this unused PC memory to organization storage is called Data Grid. Data Grid depends on a set of widely distributed and un-trusted storage nodes in Grid environment. Securing the Grid environment presents the distinctive set of challenges. These security challenges must be carefully managed before fully deploying Data Grids in sensitive distributed environments. In this paper we propose a cryptographic protocol able to fulfill the storage security requirements related with Data Grid. The proposed protocol uses three basic mechanisms to accomplish its goal: (a) symmetric cryptography and hashing, (b) selection of cryptography algorithm (c) an Information Dispersal Algorithm and (d) ―Quality of Security‖ (QoSec) quantitative metric.

Keywords


Volunteer Computing, Data Grid, Cryptography, Hashing, Information Dispersal Algorithm, PetaFLOPS, Exabyte.

Full Text:

PDF

References


Classic ap profile version 4.03. http://www.eugridpma.org/igtf/IGTF-AP-classic- 20050905-4-03.pdf, 2005.

Berkeley open infrastructure for network computing. http://boinc.berkeley.edu/, 2007.

Coregrid network of excellence. http://www.coregrid.net, 2007.

Tapping pc resources for storage needs. http://www.internetnews.com/storage/article.php/3720931, 2007.

D.P. Anderson. Boinc: A system for public-resource computing and storage. In R. Buyya, editor, GRID, pages 4–10. IEEE Computer Society, 2004.

V. Casola, A. Mazzeo, N. Mazzocca, and V. Vittorini. A policy-based methodology for security evaluation: A security metric for public key infrastructures. Journal of Computer Security, 15(2):197–229, 2007.

V. Casola, R. Preziosi, M. Rak, and L. Troiano. A reference model for security level evaluation: Policy and fuzzy techniques. J. UCS, 11(1):150–174, 2005.

R. Housley, W. Polk, W. Ford, and D. Solo. Internet X.509 Public Key Infrastructure-Certificate and Certificate Revocation List (CRL) Profile. RFC 3280 (Informational), 2002.

J. Luna et al. An analysis of security services in grid storage systems. In CoreGRIDWorkshop on Grid Middleware 2007, June 2007.

J. Luna, M. Medina, and O. Manso. Using ogro and certiver to improve ocsp validation for grids. In Y.C. Chung and J.E. Moreira, editors, GPC, volume 3947 of Lecture Notes in Computer Science, pages 12–21. Springer, 2006.

A. Mei, L.V. Mancini, and S. Jajodia. Secure dynamic fragment and replica allocation in large-scale distributed file systems. IEEE Trans. Parallel Distrib. Syst., 14(9):885–896, 2003.

J.S. Plank. A tutorial on reed-solomon coding for faulttolerance in raid-like systems. Technical Report CS-96-332, University of Tennessee, Department of Computer Science, 1997.

M.O. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM, 36(2):335–348, 1989.

E. Riedel, M. Kallahalla, and R. Swaminathan. A frame work for evaluating storage system security. In D.D.E. Long, editor, FAST, pages 15–30. USENIX, 2002.

M.W. Storer, K.M. Greenan, E.L. Miller, and K. Voruganti. Secure archival storage with potshards. In FAST’07: Proceedings of the 5th conference on USENIX Conference on File and Storage Technologies, pages 11–11, Berkeley, CA, USA, 2007. USENIX Association.




DOI: http://dx.doi.org/10.36039/AA032011003

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.