The Disintegration Protocol: An Ultimate Technique for Cloud Data Security

Bharat S. Rawal, Harsha K. Kalutarage, S. Sree Vivek, Kamlendu Pandey

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

There has been an accelerating trend in outsourcing data to Cloud Service Providers (CSPs) who offer huge storage space for a little cost. Once data goes into the cloud, owners lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. These worries security and restrict the use of cloud services not so much malleable. In this paper, we also propose a similar disintegration technique for cyber defense. In general, the server is designed to perform N number of different tasks (functions). We disintegrate the suite of web services to N separate services and move them from one server and distribute among M homogeneous servers. We demonstrate design and implementation of the unidirectional, closed and Disintegrated Protocol (DIP) to achieve this.

Original languageEnglish (US)
Title of host publicationProceedings - 2016 IEEE International Conference on Smart Cloud, SmartCloud 2016
EditorsMeikang Qiu
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages27-34
Number of pages8
ISBN (Electronic)9781509052622
DOIs
StatePublished - Dec 22 2016
Event2016 IEEE International Conference on Smart Cloud, SmartCloud 2016 - New York, United States
Duration: Nov 18 2016Nov 20 2016

Publication series

NameProceedings - 2016 IEEE International Conference on Smart Cloud, SmartCloud 2016

Other

Other2016 IEEE International Conference on Smart Cloud, SmartCloud 2016
CountryUnited States
CityNew York
Period11/18/1611/20/16

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'The Disintegration Protocol: An Ultimate Technique for Cloud Data Security'. Together they form a unique fingerprint.

Cite this