Distributed Key Systems: Enhancing Security...

'Cryptography Tutorials - Herong's Tutorial Examples' tutorials were cited in an 'Issues in Information Systems' paper in 2013.

The Cryptography Tutorials - Herong's Tutorial Examples tutorials were cited in an "Issues in Information Systems" paper in 2013.

Subject: DISTRIBUTED KEY SYSTEMS: ENHANCING SECURITY, FAULT TOLERANCE
   AND DISASTER RECOVERY IN CLOUD COMPUTING
Date: Aug 31, 2013
Author: Erich Rice, Paul Safonov, and Dennis Guster 
   from Saint Cloud State University
Source: http://www.iacis.org/iis/2013/320_iis_2013_444-451.pdf

ABSTRACT
Cloud computing has increased the need for sound and sophisticated 
security strategies. Although encryption is the primary mechanism to 
provide security in data transmission, cloud computing offers both 
advantages and disadvantages to enhancing the encryption process. 
Encryption algorithms currently available are robust, but are well 
known and require a “key” to make a session unique. Therefore, if 
the key is compromised the encryption can be unlocked no matter how 
robust the algorithm. In the classical model, a node in a network 
contains the entire key, and if compromised, then potentially the 
entire cloud’s security could be breached. Also, if the key were 
destroyed then all the data it protects could be lost, because the 
data couldn’t be unencrypted. Therefore, splitting the key and 
storing portions on multiple nodes within a cloud would make it more 
difficult to compromise or lose the key. Further, the key could be 
striped (like a RAID, Redundant Array of Independent Disks) so if 
distributed across multiple nodes some could fail and the key could 
still be recovered. This methodology could create greater security, 
while providing greater fault tolerance by allowing retrieval of the 
entire key even if some nodes were compromised or destroyed.

...

REFERENCES
1. Abdalla, M., Bellare, M., & Neven, G. (2008). Robust Encryption, 
   Cryptology ePrint Archive, 2008/440. Retrieved from 
   http://eprint.iacr.org/2008/440.pdf.
2. Barker, E., & Roginsky, A. (2012). Recommendation for Cryptographic 
   Key Generation, NIST Special Publication 800-133. Retrieved from 
   http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133.pdf.
...
11. Herong, Y. (2013). Cryptography Tutorials – Herong’s Tutorial Examples. 
   Retrieved from http://www.herongyang.com/Cryptography/.
...

Table of Contents

 About This Book

 Reference Citations in 2016

 Reference Citations in 2015

 Reference Citations in 2014

Reference Citations in 2013

 (Android) Getting Current Date and Time

 Deatil View with other language

 Ordering and Installing SSL

 JDK (JBoss/Tomcat) SSL Issue

 Web-palveluiden koostaminen: web- ja RESTful-palvelut

 Corso di Architetture Orientate ai Servizi

 Hardening a SAS Installation on a multi tier installation on Linux

 [scala-user] for-loops still not optimized in 2.10?

 .bin/.cue - the purpose of .cue?

 (horror movie) com.hellogood.eCalendar

 Using keytool to convert bks file to p12

 Error while using LWP::Socket to send XML Data

 jdk 1.7 keytool doesn't save

 Distributed Key System Broken Up Over Multiple Nodes

 Upgrading to a Mantis UTF8

 Cant receive MMS with wifi turned on

 Including and using the MySql.Data.dll on your web host server

 Spring Download (in Korean)

 Android Data Storage Folders

Distributed Key Systems: Enhancing Security...

 WP Spreadplugin Basket not shown

 How do you get multiple resultset from a single CallableStatement?

 Blowfish Cipher Algorithm in Java

 Harmonics Systems for Time Mining

 Reference Citations in 2012

 Reference Citations in 2011

 Reference Citations in 2010

 Reference Citations in 2009

 Reference Citations in 2008

 Reference Citations in 2007

 Reference Citations in 2006

 Reference Citations in 2005

 Reference Citations in 2004

 Reference Citations in 2003

 PDF Printing Version