Browse > Article
http://dx.doi.org/10.7840/kics.2013.38B.5.401

Weakness and Improvement of Cloud Shredder  

Park, Minsu (고려대학교 정보보호대학원 정보보증 연구실)
Kang, Sunghoon (고려대학교 정보보호대학원 정보보증 연구실)
Kim, Seungjoo (고려대학교 정보보호대학원 정보보증 연구실)
Abstract
Recently, almost all data has stored and managed in the shape of digital as development of IT infrastructure. Digital data is able to store the huge data in very small space. but if the disk should be stolen or lost, it would have many secure problems such as data leakage. Currently, digital data is protected by encryption method to prevent data leakage. However, the encryption method is not enough to protect data because the performance of attack system is higher and the attack methods is various. Therefore, there is a need for a new advanced data protection method. To solve secure problems, many research has been progressed like Cloud Shredder, which distributes data and then store. In this paper, We found out the problem of the Cloud Shredder and proposed an advanced method of digital data protection to solve those problem.
Keywords
Secret Sharing; Data Protection; Cloud; Cloud Shredder;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Amazon, [Online], Available: http://www.amazon.com,
2 Y. Cho, Y. Seo, and Y. Kim, "The cloud computing service and the advanced network," in Proc. KICS Fall Conf., pp. 158-159, Seoul, Korea, Nov. 2010.
3 U. Berger, CSI/FBI Computer Crime and Security Survey. 2011-2012, Retrieved April, 28, 2011, from http://gocsi.com.
4 Microsoft, Windows bitlocker drive encryption frequently asked questions, Retrieved April, 30, 2009, from http://technet.microsoft.com/enus/library/cc766 200(WS.10).aspx
5 I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and Grid computing 360-degree compared," in Proc. Grid Comput. Environment Workshop(GCE'08), pp. 1-10, Austin, U.S.A., Nov. 2008.
6 NBS, "Data Encryption Standard. Federal Information Processing Standard Pub," 1977
7 A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612-613, Nov. 1979.   DOI   ScienceOn
8 Shamir's Secret Sharing Scheme, [Online], Available: http://point-at-infinity.org/ssss,
9 N. Zhang, J. Jing, and P. Liu, "CLOUD SHREDDER: Removing the laptop on-road data disclosure threat in the cloud computing era," in Proc. IEEE Int. Conf. Security and Privacy Comput. Commun., pp. 16-18, Changsha, China, Nov. 2011.
10 A. Zonenberg, "Distributed hash cracker: A cross-platform GPU-accelerated password recovery system," Rensselaer Polytechnic Institute, Apr. 2009.
11 Dropbox, [Online], Available: https://www.dropbox.com,