IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Information Security in Data and Storage Grids through GS3

Information Security in Data and Storage Grids through GS3
View Sample PDF
Author(s): Vincenzo Daniele Cunsolo (Università di Messina, Italy), Salvatore Distefano (Università di Messina, Italy), Antonio Puliafito (Università di Messina, Italy)and Marco Scarpa (Università di Messina, Italy)
Copyright: 2014
Pages: 17
Source title: Crisis Management: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-4707-7.ch025

Purchase

View Information Security in Data and Storage Grids through GS3 on the publisher's website for pricing and purchasing information.

Abstract

In grid computing infrastructures, the data storage subsystem is physically distributed among several nodes and logically shared among several users. This highlights the necessity of: (i) Availability for authorized users only, (ii) Confidentiality, and (iii) Integrity of information and data: in one term security. In this work we face the problem of data security in grid, by proposing a lightweight cryptography algorithm combining the strong and highly secure asymmetric cryptography technique (RSA) with the symmetric cryptography (Advanced Encryption Standard, AES). The proposed algorithm, we named Grid Secure Storage System (GS3), has been implemented on top of the Grid File Access Library (GFAL) of the gLite middleware, in order to provide a file system service with cryptography capability and POSIX interface. The choice of implementing GS3 as a file system allows to protect also the file system structure, and moreover to overcome the well-known problem of file rewriting in gLite/GFAL environments. This chapter describes and details both the GS3 algorithm and its implementation, also evaluating the performance of such implementation and discussing the obtained results.

Related Content

Christopher Nyakotyo, Pedzisai Goronga. © 2024. 18 pages.
Colleen Halupa. © 2024. 23 pages.
Stefan Handke. © 2024. 14 pages.
Jaime Santos-Reyes, Galdino Santos-Reyes, Ricardo Tejeida-Padilla. © 2024. 19 pages.
Ahmad Kayaly. © 2024. 20 pages.
Elizabeth Stroble. © 2024. 15 pages.
Mubango Hazel, Hlanganipai Ngirande, Khathutshelo Khashane. © 2024. 20 pages.
Body Bottom