A study on weakness and improvement of Cloud Shredder

Minsu Park, Sunghoon Kang, Seungjoo Kim

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Recently, almost all data have been stored and managed by digital types because of development of IT infrastructure. Digital data has the advantage of huge data that can be stored in very small space. However, there is a risk that a large amount of data can be leaked if disk which stored digital data is stolen or lost. Currently, digital data is protected by encryption method to prevent data leaking. However, the encryption method is not enough to protect data because the performance of attack system is higher and the attack methods are various. Therefore, there is a need for a new advanced data protection method. There have been a variety of research methods such as Cloud Shredder which is to maintain local storage and cloud storage for solving this problem. In this paper, we identify the problem of the existing method and propose an advanced method of digital data protection to solve that problem

    Original languageEnglish
    Title of host publication2013 International Conference on ICT Convergence
    Subtitle of host publication"Future Creative Convergence Technologies for New ICT Ecosystems", ICTC 2013
    PublisherIEEE Computer Society
    Pages1107-1113
    Number of pages7
    ISBN (Print)9781479906987
    DOIs
    Publication statusPublished - 2013
    Event2013 International Conference on Information and Communication Technology Convergence, ICTC 2013 - Jeju Island, Korea, Republic of
    Duration: 2013 Oct 142013 Oct 16

    Publication series

    NameInternational Conference on ICT Convergence
    ISSN (Print)2162-1233
    ISSN (Electronic)2162-1241

    Other

    Other2013 International Conference on Information and Communication Technology Convergence, ICTC 2013
    Country/TerritoryKorea, Republic of
    CityJeju Island
    Period13/10/1413/10/16

    Keywords

    • Cloud Computing
    • Cloud Shredder
    • Data Protection
    • Secret Sharing

    ASJC Scopus subject areas

    • Information Systems
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'A study on weakness and improvement of Cloud Shredder'. Together they form a unique fingerprint.

    Cite this