We develop IDEAS, an identity-based security architecture for large-scale and high-performance storage systems, designed to improve security, convenience and total cost of access control by merging identity management with access control in these systems. IDEAS authenticates users at each I/O node by using a single-identity certificate without the service of a centralized security server and enforces access control mechanism by using an object-based access control (OBAC) model, which is designed to address the complexity and scalability issue of security administration in large-scale storage systems. We also discuss the issue of how to identify and authenticate a large number of users with the state-of-the-art cryptographic solutions and su...
Formal techniques have played a significant role in the study of secure communication in recent year...
The recent technological advancement has taken cloud computing (CC) infrastructure to a significant ...
[[abstract]]Object-based storage offloads some works of file systems to storage devices to improve s...
There has been great progress in taming the volume, velocity and variation of Big Data. Its volume c...
This paper describes DSFS, a decentralized security system for large parallel file system. DSFS stor...
Controlling data access in public cloud storage systems is a difficult topic. The Cipher text-Policy...
Cloud-based platforms have become the principle way to store, share, and synchronize files online. F...
Data sharing has never been anything but difficult to the progression of cloud computing. The storag...
Data access control is a challenging issue in public cloud storage systems. Cipher text-Policy Attri...
A major security concern with outsourcing data storage to third-party providers is authenticating th...
With the rapidly falling price of hardware, and increasingly available bandwidth, storage technology...
The main objective of system is secure data storage on clouds. Cloud checks the authentication of th...
Maximizing local autonomy by delegating functionality to end nodes when possible (the end to end d...
We present an official basis model of the proposed method, intended for applied cloud storage system...
Petascale, high-performance file systems often hold sensitive data and thus require security, but aut...
Formal techniques have played a significant role in the study of secure communication in recent year...
The recent technological advancement has taken cloud computing (CC) infrastructure to a significant ...
[[abstract]]Object-based storage offloads some works of file systems to storage devices to improve s...
There has been great progress in taming the volume, velocity and variation of Big Data. Its volume c...
This paper describes DSFS, a decentralized security system for large parallel file system. DSFS stor...
Controlling data access in public cloud storage systems is a difficult topic. The Cipher text-Policy...
Cloud-based platforms have become the principle way to store, share, and synchronize files online. F...
Data sharing has never been anything but difficult to the progression of cloud computing. The storag...
Data access control is a challenging issue in public cloud storage systems. Cipher text-Policy Attri...
A major security concern with outsourcing data storage to third-party providers is authenticating th...
With the rapidly falling price of hardware, and increasingly available bandwidth, storage technology...
The main objective of system is secure data storage on clouds. Cloud checks the authentication of th...
Maximizing local autonomy by delegating functionality to end nodes when possible (the end to end d...
We present an official basis model of the proposed method, intended for applied cloud storage system...
Petascale, high-performance file systems often hold sensitive data and thus require security, but aut...
Formal techniques have played a significant role in the study of secure communication in recent year...
The recent technological advancement has taken cloud computing (CC) infrastructure to a significant ...
[[abstract]]Object-based storage offloads some works of file systems to storage devices to improve s...