The Disintegration Protocol: An Ultimate Technique for Cloud Data Security

Bharat S. Rawal, Harsha K Kalutarage, S. Sree Vivek, Kamlendu Pandey

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

There has been an accelerating trend in outsourcing data to Cloud Service Providers (CSPs) who offer huge storage space for a little cost. Once data goes into the cloud, owners lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. These worries security and restrict the use of cloud services not so much malleable. In this paper, we also propose a similar disintegration technique for cyber defense. In general, the server is designed to perform N number of different tasks (functions). We disintegrate the suite of web services to N separate services and move them from one server and distribute among M homogeneous servers. We demonstrate design and implementation of the unidirectional, closed and Disintegrated Protocol (DIP) to achieve this.
Original languageEnglish
Title of host publicationProceedings for IEEE International Conference on Smart Cloud (SmartCloud)
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages27-34
Number of pages8
ISBN (Print)978-1-5090-5262-2
DOIs
Publication statusPublished - 26 Dec 2016
EventThe IEEE International Conference on Smart Cloud 2016 (SmartCloud 2016) - New York, United States
Duration: 18 Nov 201620 Nov 2016
http://csis.pace.edu/CSCloud/sc2016/

Conference

ConferenceThe IEEE International Conference on Smart Cloud 2016 (SmartCloud 2016)
Country/TerritoryUnited States
CityNew York
Period18/11/201620/11/2016
Internet address

Fingerprint

Dive into the research topics of 'The Disintegration Protocol: An Ultimate Technique for Cloud Data Security'. Together they form a unique fingerprint.

Cite this