Sunteți pe pagina 1din 16

EFFICIENT DATA STORAGE IN DESKTOP

DATA-GRID COMPUTING

To protects data against attacks, appropriate


security measures have to be taken.

INTRODUCTION

Volunteer Computing is a type of distributed computing in


which computer owners donate their computing resources
to one or more projects.

The desktop Data Grid system has many security


drawbacks that need to be addressed.

The data is fragmented and stored in many systems which


are a part of the grid termed as the VSCs.

A cryptographic protocol able to full fill the storage security


requirements related with a generic Desktop Data Grid
scenario.

The proposed protocol uses


mechanisms to accomplish its goal:

three

basic

(a) Symmetric cryptography and hashing,


(b) Information Dispersal Algorithm and
(c) Fragmentation Factor (FF) quantitative
metric.

SECURITY FRAMEWORK COMPONENTS

Players : Three data readers / writers are involved


i. The volunteer storage client
ii. The centralized project server
iii. The WAN links conveying
project servers.

information between VSCs and the

Attacks : The generic attacks that may be executed over the Desktop Data
Grid are related with
i. Adversaries on the wire
ii. Adversaries on the infrastructure servers(project servers and door
node)
iii. Revoked users on the door node
iv. Adversaries with full control of the site services (VSCs) Each
of these attacks will either destroy data, or leak data, or change data.

Security primitives : Door node.


Trust assumptions :

VSCs client software is trusted only when the data


is coming from a project server.
VSCs have full control over the data stored in them.

To enhance security level and to reduce the complexity of the


servers.
The grid users and the clients belong to a single tier .
The project server also has a centralized server that takes care of all
the data fragmentation works and also stores the metadata about the
storage and the retrieval of the data with the VSCs .
The authentication is done locally .
The Information Dispersal pattern is alone determined by the
centralized server based on the fragmentation factor.

The enhanced performance is achieved if the sensitivity


of the data is also considered before storing the
fragments.

FF which accounts
(i) the security of the client and
(ii) the sensitivity of the data.

EXPERIMENTAL ANALYSIS

User Login:

File Encryption and Decryption:


-File or mail message into a text form
unreadable.
-Decryption is the reverse process of
converting encoded data to its original un-encoded form
plaintext.
-Data Encryption Standard (DES).
File Fragmentation and Defragmentation:
It occurs when a single file is being broken
into multiple pieces and defragmentation is used to combine
multiple pieces into single file.

ENCRYPTION AND FRAGMENTATION

Volunteer Storage Clients (VSC):


Volunteer computing (also called peer-topeer computing or global computing) uses computers
volunteered by the general public to do distributed computing.
maintain the files into various parts to
protect and to return the file to the exact user who has registered
in the grid services.

Volunteer storage clients

S-ar putea să vă placă și