On the optimal placement of secure data objects over Internet

@article{Tu2005OnTO,
  title={On the optimal placement of secure data objects over Internet},
  author={Manghui Tu and Peng Li and Qingkai Ma and I-Ling Yen and Farokh B. Bastani},
  journal={19th IEEE International Parallel and Distributed Processing Symposium},
  year={2005},
  pages={10 pp.-}
}
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changing the number of shares in secret sharing schemes can be costly. To achieve performance goals in data accesses, secret sharing can be combined with dynamic replication in a distributed system with varying client access patterns. In this paper, we investigate the problem of optimal allocation of secure data objects that… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 15 CITATIONS

DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security

VIEW 5 EXCERPTS
HIGHLY INFLUENCED

Division and replication of data for cloud security

VIEW 1 EXCERPT
CITES BACKGROUND

An Effective Security Scheme Using Division and Replication of Data in Cloud for Optimal Performance

  • Pranjali Bhingarkar, Dr. Mohd Shafi Pathan
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

A Security-Aware Data Placement Mechanism for Big Data Cloud Storage Systems

  • Seungmin Kang, Bharadwaj Veeravalli, Khin Mi Mi Aung
  • Computer Science
  • 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS)
  • 2016
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 21 REFERENCES

On the optimal placement of secure data over internet

  • M. Tu, et. al
  • TR-UTDCS
  • 2004

Transaction based dynamic partial replication in mobile environments

  • Manghui Tu, Peng Li, I-Ling Yen
  • Computer Science
  • 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings.
  • 2004

Responsive Security for Stored Data

DARPA Information Assurance Program dynamic defense experiment summary

Extending the DARPA off-line intrusion detection evaluations

Optimal placement of replicas in trees with read, write, and storage costs,

  • K. K. Kalpakis, et. al
  • IEEE Transactions on Parallel and Distributed Systems
  • 2001

Placement of read-write proxies in the Internet,

  • X. Jia, et. al
  • In proceedings ICDCS
  • 2001

Clustering of the self-organizing map