This HTML5 document contains 53 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n13http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n19http://purl.org/net/nknouf/ns/bibtex#
n21http://localhost/temp/predkladatel/
n16http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F61989100%3A27740%2F12%3A86084779%21RIV13-MSM-27740___/
n7http://linked.opendata.cz/resource/domain/vavai/projekt/
n20http://linked.opendata.cz/resource/domain/vavai/subjekt/
n6http://linked.opendata.cz/ontology/domain/vavai/
n9https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n4http://linked.opendata.cz/ontology/domain/vavai/riv/
n17http://bibframe.org/vocab/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n10http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n18http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n12http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n22http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n15http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n5http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F61989100%3A27740%2F12%3A86084779%21RIV13-MSM-27740___
rdf:type
n6:Vysledek skos:Concept
dcterms:description
Cloud computing is a model that provides ubiquitous, on demand access to a shared pool of computing resources including networks, servers, storage, application and services that can be easily provisioned and released. As Cloud is a shared and distributed environment, the need for ensuring security of its critical infrastructure that includes computing, network and storage is immense. One of the critical resources to look after in cloud environment is the data which is stored in files. The files can be configuration file at servers, or private user confidential files at users own work space but they all have a risk of data modification associated with them. If user data is modified through an attack then it will decline the trust of user on cloud services and if the important configuration files are modified, they will disrupt the functioning of cloud environment, like attacker can escalate its privileges and access to critical resources through such tampering and modifications to important files. The paper solves the problem addressed and focuses on a proposal and prototype implementation of a tool built for Cloud File integrity establishment and monitoring that establishes and checks file Integrity periodically. The novelty of the approach lies in the fact that the tool does not require any database for storing the integrity of files and the integrity of the file is the compressed encrypted hash of the data stored in the file that can't be reverse engineered by an attacker easily. The tool is lightweight and initial results dictate that it is scalable and efficient. The Real time deployment and analysis of tool is under progress. Cloud computing is a model that provides ubiquitous, on demand access to a shared pool of computing resources including networks, servers, storage, application and services that can be easily provisioned and released. As Cloud is a shared and distributed environment, the need for ensuring security of its critical infrastructure that includes computing, network and storage is immense. One of the critical resources to look after in cloud environment is the data which is stored in files. The files can be configuration file at servers, or private user confidential files at users own work space but they all have a risk of data modification associated with them. If user data is modified through an attack then it will decline the trust of user on cloud services and if the important configuration files are modified, they will disrupt the functioning of cloud environment, like attacker can escalate its privileges and access to critical resources through such tampering and modifications to important files. The paper solves the problem addressed and focuses on a proposal and prototype implementation of a tool built for Cloud File integrity establishment and monitoring that establishes and checks file Integrity periodically. The novelty of the approach lies in the fact that the tool does not require any database for storing the integrity of files and the integrity of the file is the compressed encrypted hash of the data stored in the file that can't be reverse engineered by an attacker easily. The tool is lightweight and initial results dictate that it is scalable and efficient. The Real time deployment and analysis of tool is under progress.
dcterms:title
A Secure and LightWeight Approach for Critical Data Security in Cloud A Secure and LightWeight Approach for Critical Data Security in Cloud
skos:prefLabel
A Secure and LightWeight Approach for Critical Data Security in Cloud A Secure and LightWeight Approach for Critical Data Security in Cloud
skos:notation
RIV/61989100:27740/12:86084779!RIV13-MSM-27740___
n6:predkladatel
n20:orjk%3A27740
n4:aktivita
n12:P
n4:aktivity
P(ED1.1.00/02.0070)
n4:dodaniDat
n5:2013
n4:domaciTvurceVysledku
Abraham Padath, Ajith
n4:druhVysledku
n15:D
n4:duvernostUdaju
n8:S
n4:entitaPredkladatele
n16:predkladatel
n4:idSjednocenehoVysledku
120591
n4:idVysledku
RIV/61989100:27740/12:86084779
n4:jazykVysledku
n18:eng
n4:klicovaSlova
signature; Security; Monitoring; monitoring; Intrusion detection; Integrity; hash; file; establishment; Compression; Cloud; attacker
n4:klicoveSlovo
n10:Compression n10:Integrity n10:signature n10:Intrusion%20detection n10:monitoring n10:establishment n10:Cloud n10:Monitoring n10:hash n10:attacker n10:Security n10:file
n4:kontrolniKodProRIV
[D816C91E2370]
n4:mistoKonaniAkce
Sao Carlos
n4:mistoVydani
New York
n4:nazevZdroje
Proceedings of the 2012 4th International Conference on Computational Aspects of Social Networks, CASoN 2012 : 21 – 23 November 2012, São Carlos, Brazil
n4:obor
n22:IN
n4:pocetDomacichTvurcuVysledku
1
n4:pocetTvurcuVysledku
4
n4:projekt
n7:ED1.1.00%2F02.0070
n4:rokUplatneniVysledku
n5:2012
n4:tvurceVysledku
Gupta, Sanchika Abraham Padath, Ajith Sardana, Anjali Kumar, Padam
n4:typAkce
n13:WRD
n4:zahajeniAkce
2012-11-21+01:00
s:numberOfPages
6
n17:doi
10.1109/CASoN.2012.6412421
n19:hasPublisher
IEEE
n9:isbn
978-1-4673-4793-8
n21:organizacniJednotka
27740