Abstract
A novel artificial immune strategies based data storage model, called AIS-DS, is proposed for dealing with the problem of resources sharing in a storage area network (SAN). Especially for the multi-user’s tasks, this technology has some essential features for ensuring the security and privacy of information and/or data, because a SAN here can be regarded exclusive for each user with its own vaccines (a kind of special codes assigned for this user), and on the other hand, damage or interference to the disk or type to some extent in a local area of SAN, will not destroy the integrity of the saved data. Furthermore, with AIS-DS, the privacy of user’s coded/decoded data is guaranteed even if the disk is physically handed by some other unwanted users.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This research is supported by National Science Foundation of China under grant no60372045.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Klarreich, E.: Inspired by Immunity. Nature 415(1), 468–470 (2002)
Esponda, F., Forrest, S., Helman, P.: A formal framework for positive and negative detection. IEEE Transactions on Systems, Man, and Cybernetics –Part B: Cybernetics 34(1), 357–373 (2004)
De Castro, L.N., Von Zuben, F.J.: Learning and Optimization Using the Clonal Selection Principle. IEEE Transactions on Evolutionary Computation, Special Issue on Artificial Immune Systems 6(3), 239–251 (2002)
Dasgupta, D., Gonzalez, F.: An Immunity-Based Technique to Characterize Intrusions in Computer Networks. IEEE Transactions on Evolutionary Computation 6(3), 102–119 (2002)
Wassung, K.W.: Challenging the theory of artificial immunity, http://www.atlaschiro.com/artificial-immunity.htm
Janssen, M.A.: An immune system perspective on ecosystem management. Conservation Ecology 5(1), 13–15 (2001)
New York Hall of Science website, http://www.nyhallsci.org/whataboutaids/whatis/immune/frame.html
ENSTOR® website: Optimized storage systems, http://www.enstor.com.au/sol_store_data/cons_disk.html
John, P.G.: Digital Communications. McGraw-Hill, New York (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, L., Nie, Y., Nie, W., Jiao, L. (2005). Artificial Immune Strategies Improve the Security of Data Storage. In: Wang, L., Chen, K., Ong, Y.S. (eds) Advances in Natural Computation. ICNC 2005. Lecture Notes in Computer Science, vol 3611. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11539117_118
Download citation
DOI: https://doi.org/10.1007/11539117_118
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28325-6
Online ISBN: 978-3-540-31858-3
eBook Packages: Computer ScienceComputer Science (R0)