2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing 2011
DOI: 10.1109/dasc.2011.114
|View full text |Cite
|
Sign up to set email alerts
|

SecDM: Securing Data Migration between Cloud Storage Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 8 publications
0
16
0
Order By: Relevance
“…The research work done in this area is still in embryonic stage over the past few years. In the paper [2], an approach has been proposed to migrate data on cloud servers through the combined use of cryptography and steganography. In cryptography process, a simple yet effective technique was used for data encryption using one's complement method which is called as SCMACS (Secure Cloud Migration Architecture using Cryptography and Steganography).…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…The research work done in this area is still in embryonic stage over the past few years. In the paper [2], an approach has been proposed to migrate data on cloud servers through the combined use of cryptography and steganography. In cryptography process, a simple yet effective technique was used for data encryption using one's complement method which is called as SCMACS (Secure Cloud Migration Architecture using Cryptography and Steganography).…”
Section: Literature Surveymentioning
confidence: 99%
“…Security in transmission of the data is another major issue where the data could be to expose and compromised. Hence, it is very important to have mechanisms that enable users to securely migrate the data from one CSP to another CSP [2]. Four security issues mainly concerned for data migration are: Authentication, Confidentiality, Integrity and Authorization.…”
Section: Introductionmentioning
confidence: 99%
“…• Between public clouds: A MapReduce computation may be executed in more than one public cloud [97]. In that case, data flow may occur between two master processes at two different clouds, between two mappers at two different clouds, between two reducers at two different clouds, and a mapper and a reducer at two different clouds.…”
Section: Security and Privacy Challenges In Mapreducementioning
confidence: 99%
“…Apache Accumulo is built on top of Apache Hadoop, Zookeeper, and Thrift. [3] M 8 Apache Sentry [4] S Apache Ranger [4] M Project Rhino [5] S Apache Accumulo [6] S Airavat [92] S Khaled et al [57] Vigiles [109] GuardMR [107] G-Hadoop [135] SecDM [97] M iBigTable [119] Lin et al [64] S 9 10 SAPSC [96] M ClusterBFT [99] S, H 11 Moca et al [76] SecureMR [118] S AccountableMR [123] S VIAF [115] S CCMR [116] M IntegrityMR [117] M VAWS [39] S Hatman [58] S 12 TrustMR [108] S TS-TRV [38] S Log-based [125] S Watermarking based [53,37] S Accountable MapReduce (RBAC) [110] S Airavat. Airavat [92] is a system that provides mandatory access control together with differential privacy for data protection.…”
Section: Authentication Authorization and Access Control Based Apprmentioning
confidence: 99%
See 1 more Smart Citation