Abstract
Distributed computing infrastructure’s data storage subsystems are usually physically scattered among several nodes and logically shared among several users and (local) administrators. It is therefore necessary to provide users with adequate mechanisms and tools for information and data security management, especially in large scale systems since the complexity of the problem increases with the number of users and the amounts of data. In this chapter we propose a solution based on a lightweight cryptography algorithm combining the strong and highly secure asymmetric cryptography technique (RSA) with the symmetric cryptography (AES). We describe a possible implementation of our solution going into details of all the algorithms and the mechanisms specified.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
AES (2001) Federal information. processing strandard pubblication 197.
Blanchet C, Mollon R, Deleage G (2006) Building an encrypted file system on the egee grid: Application to protein sequence analysis. In: ARES ’06: Proceedings of the First International Conference on Availability, Reliability and Security, IEEE Computer Society, Washington, DC, USA, pp 965–973
Junrang L, Zhaohui W, Jianhua Y, Mingwang X (2004) A secure model for network-attached storage on the grid. In: SCC ’04: Proceedings of the 2004 IEEE International Conference on Services Computing, IEEE Computer Society, Washington, DC, USA, pp 604–608
Kerckhoffs A (1883) La cryptographie militaire. Journal des sciences militaires IX:5–83
Rivest RL, Shamir A, Adelman LM (1978) A method for obtaning digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Scardaci D, Scuderi G (2007) A secure storage service for the glite middleware. In: International Symposium on Information Assurance and Security, IEEE Computer Society, Los Alamitos, CA, USA, pp 261–266
Seitz L BL Pierson J-M (2003) Key management for encrypted data storage in distributed systems. In: IEEE Security in Storage Workshop, Washington DC, USA, October 2003, IEEE Computer Society, pp 20–30
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Thain D, Livny M (2004) Parrot: An application environment for data-intensive computing. Journal of Parallel and Distributed Computing Practices
Tu M, Li P, Yen IL, Thuraisingham B, Khan L (2009) Secure Data Objects Replication in Data Grid. Transaction on Dependable and Secure Computing To appear
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Distefano, S., Puliafito, A. (2011). Information Security in Large Scale Distributed Systems. In: Furht, B., Escalante, A. (eds) Handbook of Data Intensive Computing. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1415-5_18
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1415-5_18
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-1414-8
Online ISBN: 978-1-4614-1415-5
eBook Packages: Computer ScienceComputer Science (R0)