Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
5Activity

Table Of Contents

1. Introduction
2. State of the Art
2.1 Cryptography
2.1.1 Encryption & Decryption
2.1.2 Symmetric Algorithms
2.1.3 Asymmetric Algorithms
2.1.4 Digital Signatures
2.1.5 Hash Functions
2.2 Cloud Computing
2.3 Cloud Storage
2.3.1 Amazon S3
2.3.2 Google Cloud Storage
2.3.3 Dropbox
2.3.4 Cloud Storage Security Requirements
2.3.5 Cloud Storage Security Solutions
2.3.6 Infinispan
2.4 Cryptographic Access Control
2.5 Summary
3.1 Cryptographic Protection of Data
3.2 Key Exchange
3.2.1 Granting Access Permission by Exchanging Keys
3.2.2 Access Permission by Using Key Rings
3.3 Robustness of Cryptographic Access Control
3.3.1 Confidentiality
3.3.2 Integrity
3.4 Summary
4.1 Overview of the System
4.2 Infinispan Data Grid
4.3 Cryptography
4.3.1 Symmetric Encryption
4.3.2 Asymmetric Encryption
4.4 Granting Access Permission
4.4.1 Key Ring
4.5 Graphical User Interface (GUI)
4.6 Summary
5. Implementation
5.1 Structure of the System
5.2 Cryptography
5.2.1 Symmetric Encryption
5.2.2 Digital Signature
5.3 Data Handling
5.3.1 Storing Data
5.3.2 Retrieving Data
5.3.3 Removing Data
5.4 Key Ring Management
5.5 Structure of the GUI
5.6 Summary
6.1 Performance Evaluation
6.1.1 A Comparison between Windows and Java file copying
6.1.2 Storing and Retrieving files using Infinispan as Local Cache
6.1.3 Storing and Retrieving data using Infinispan in Distributed Mode
6.1.4 Key Management
6.2.3 Traffic Analysis
6.3 Further Improvements
7. Conclusion
A. Functional Test
B. Introduction to Infinispan Data Grid
Introduction to Infinispan Data Grid
C. Bibliography
0 of .
Results for:
No results containing your search query
P. 1
Secure Storage in Cloud Computing

Secure Storage in Cloud Computing

Ratings: (0)|Views: 94 |Likes:
Published by Open Research
e x c e r p t:
Data confidentiality and integrity are ensured by data encryption and digital signature respectively. For encryption of data, symmetric cryptography, and for digital signature process, asymmetric cryptography is used. The main quality of the system is that all cryptographic operations are performed on the client side, which gives the users more control on the security of their data, and thus the data are not dependent on the security solutions provided by the servers.
e x c e r p t:
Data confidentiality and integrity are ensured by data encryption and digital signature respectively. For encryption of data, symmetric cryptography, and for digital signature process, asymmetric cryptography is used. The main quality of the system is that all cryptographic operations are performed on the client side, which gives the users more control on the security of their data, and thus the data are not dependent on the security solutions provided by the servers.

More info:

Published by: Open Research on Jun 26, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/26/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 10 are not shown in this preview.
You're Reading a Free Preview
Pages 14 to 76 are not shown in this preview.
You're Reading a Free Preview
Pages 80 to 103 are not shown in this preview.

Activity (5)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
research3337559 liked this
shia_573702082 liked this
Mai Dahshan liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->