Data Security Framework for Data-Centers

Authors

  • Kumar N Department of Computer Science and Engineering, H.N.B. Garhwal University, Srinagar Garwal, Uttrakhand,India
  • Karhana A Department of Computer Science and Engineering, H.N.B. Garhwal University, Srinagar Garwal, Uttrakhand,India

DOI:

https://doi.org/10.26438/ijcse/v7i1.451456

Keywords:

Data-center, Encryption, Data security, Immutable data, Policy, Real-time backup

Abstract

Data-centers play an important role in today's time for storing and maintaining huge amounts of data being generated daily and operated in real-time, to keep this data secure becomes as much important as keeping it stored. To address the current flaws in security policy of data-centers and to eradicate those flaws this paper suggest a new security framework for data-centers. This would provide data-centers with all kind of precautions and instructions to handle most of situations that may arise during management and other data related tasks and even after breaches by defining all data storage rules by classifying data, and defining data access rights with security policies for authentication and data verification. These all things make sure that data is secured and more reliable at both aspect storage as well as data authenticity in this framework for Data-Centers.

References

[1] Ben M. Chen, Tong H. Lee, Kemao Peng and VenkatakrishnanVenkataramanan, “Hard Disk Drive Servo Systems”, Springer, pp. 3-8, 2006

[2] Katherine Murray, “Introduction to Personal Computers”, Que Corporation,India, pp. 11-28, 1990.

[3] B.FakhimM.BehniaS.W.ArmfieldN.Srinarayana“Cooling solutions in an operational data centre: A case study” Elsevier Applied Thermal Engineering, Volume 31, Issues 14–15, p.p 2279-2291,2011.

[4] Al-Fares, M., Loukissas, A., & Vahdat, A. “A scalable, commodity data center network architecture” ACM SIGCOMM Computer Communication Review, 38(4),p.p 63-74,2008.

[5] S. Mittal, “Power management techniques for data centers: A survey,” CoRR, vol. abs/1404.6681, 2014.

[6] Knapp, K. J., Denney, G. D., & Barner, M. E. "Key issues in data center security: An investigation of government audit reports". Government Information Quarterly, 28(4), p.p 533–541,2011.

[7] Maurizio Portolani, Mauricio Arregoces. "Data Center Fundamentals". Publishers, Cisco Press, 800 East 96th Street Indianapolis, IN 46240 USA,2004.

[8] “A Matrix of Security Risks and Solutions"Oracle9i Security Overview, Release 2 (9.2)Oracle Docs.",2002.

[9] The University of Kansas Policy Library."Data Classification and Handling Policy", 2014.

[10] "Data Center Access Policy" Information Technology Services, West Virginia University, 2018.

[11] Laurens Van Houtven, "Crypto 101" Creative Comons,2013.

[12] Diffie, W., & Hellman, M. "New directions in cryptography". IEEE Transactions on Information Theory, 22(6),p.p 644–654,1976.

[13] Jonathan Katz Yehuda Lindell - "Introduction to Modern Cryptography_ Principles and Protocols",Chapman And Hall/CRC, p.p 241-245, 2007.

[14] Tadayoshi Kohno, Niels Ferguson, Bruce Schneier -"Cryptography Engineering Design Principles and practical applications" Wiley Publishing Inc.,2010.

[15] Goldreich O - "Foundations of cryptography", Now Publishers Inc. 2001.

Downloads

Published

2019-01-31
CITATION
DOI: 10.26438/ijcse/v7i1.451456
Published: 2019-01-31

How to Cite

[1]
N. Kumar and A. Karhana, “Data Security Framework for Data-Centers”, Int. J. Comp. Sci. Eng., vol. 7, no. 1, pp. 451–456, Jan. 2019.