DistOS-2011W Distributed File System Security: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
The full PDF can be found [http://www. | The full PDF can be found [http://www.megaupload.com/?d=C1YA0WPS here]. | ||
=Abstract= | =Abstract= | ||
This paper provides an overview on how data security is maintained both in traditional distributed file systems, and cloud-based systems. It begins by providing background information on distributed file systems, and then continues with a series of examples of how the data is secured. Finally, an overview of a new system providing not only data, but computational security is discussed. | This paper provides an overview on how data security is maintained both in traditional distributed file systems, and cloud-based systems. It begins by providing background information on distributed file systems, and then continues with a series of examples of how the data is secured. Finally, an overview of a new system providing not only data, but computational security is discussed. |
Revision as of 05:29, 2 March 2011
The full PDF can be found here.
Abstract
This paper provides an overview on how data security is maintained both in traditional distributed file systems, and cloud-based systems. It begins by providing background information on distributed file systems, and then continues with a series of examples of how the data is secured. Finally, an overview of a new system providing not only data, but computational security is discussed.