A study on weakness and improvement of Cloud Shredder

Minsu Park, Sunghoon Kang, Seungjoo Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Recently, almost all data have been stored and managed by digital types because of development of IT infrastructure. Digital data has the advantage of huge data that can be stored in very small space. However, there is a risk that a large amount of data can be leaked if disk which stored digital data is stolen or lost. Currently, digital data is protected by encryption method to prevent data leaking. However, the encryption method is not enough to protect data because the performance of attack system is higher and the attack methods are various. Therefore, there is a need for a new advanced data protection method. There have been a variety of research methods such as Cloud Shredder which is to maintain local storage and cloud storage for solving this problem. In this paper, we identify the problem of the existing method and propose an advanced method of digital data protection to solve that problem

Original languageEnglish
Title of host publication2013 International Conference on ICT Convergence
Subtitle of host publication"Future Creative Convergence Technologies for New ICT Ecosystems", ICTC 2013
PublisherIEEE Computer Society
Pages1107-1113
Number of pages7
ISBN (Print)9781479906987
DOIs
Publication statusPublished - 2013
Event2013 International Conference on Information and Communication Technology Convergence, ICTC 2013 - Jeju Island, Korea, Republic of
Duration: 2013 Oct 142013 Oct 16

Publication series

NameInternational Conference on ICT Convergence
ISSN (Print)2162-1233
ISSN (Electronic)2162-1241

Other

Other2013 International Conference on Information and Communication Technology Convergence, ICTC 2013
Country/TerritoryKorea, Republic of
CityJeju Island
Period13/10/1413/10/16

Keywords

  • Cloud Computing
  • Cloud Shredder
  • Data Protection
  • Secret Sharing

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A study on weakness and improvement of Cloud Shredder'. Together they form a unique fingerprint.

Cite this