Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 516))

  • 927 Accesses

Abstract

Securing user data is one of the challenges in all applications. User’s sensitive data present in the storage server is expected to be highly available, secured and easily accessible from anywhere according to the demand in time. This paper provides a preventive maintenance approach to access the data, though storage server containing the sensitive data fails. This approach uses a simultaneous copying technique to save the data on both storage server and backup server during the upload process. Thus, when server fails, the data needs of the user can be served by the backup server. Data file is broken into data blocks and these blocks are encrypted and stored in the storage server instead of directly uploading the sensitive data file. Thus, when an intruder gains access to the storage server and tries to access the data, retrieval of the data file is not possible since mapping of files on the data blocks is random and encrypted. This supports preventive maintenance of data which not only secures data but also reduces risk and cost of recovery.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Q. He, X. Zhang, Z. Li, Data deduplication techniques, in IEEE, International Conference on Future Information Technology and Management Engineering, (2010)

    Google Scholar 

  2. H. Wu, Z. Xue, W. Zhou, H. He, X. Dong, R. Li, Secure sensitive data sharing on a big data platform, Tsinghua Sci. Technol. 20(1), 72–80 (2015). ISSN1007-021408/11

    Google Scholar 

  3. P.S. Chen, R. Zhang, A dynamic cryptographic access control scheme in cloud storage services, Scientific Research Fund of Zhejiang Provincial Education Department, Zhejiang Provincial Key Specific Project of Science & Technology, (2010)

    Google Scholar 

  4. D. Feng, M. Zhang, C. Hong, Z. Lv, A secure and efficient revocation scheme for fine-grained access control in cloud storage, in IEEE, 4th International Conference on Cloud Computing Technology and Science, (2012)

    Google Scholar 

  5. Z. Su, W.-S. Ku, J. Feng, Y. Chen, D-DOG: securing sensitive data in distributed storage space by data division and out-of-order keystream generations, (IEEE ICC, 2010)

    Google Scholar 

  6. S. Vijayarani, A. Tamilarasi, An efficient masking technique for sensitive data protection, in IEEE-International Conference on Recent Trends in Information Technology, ICRTIT, (2011)

    Google Scholar 

  7. S.M.S. Bhanu, K.K. Hingwe, Two layered protection for sensitive data in cloud, (IEEE, 2014)

    Google Scholar 

  8. E. Bertino, X. Shu, D. Yao, Privacy-preserving detection of sensitive data exposure. IEEE Trans. Inf. Forensics Secur. 10(5), 2015

    Google Scholar 

  9. Y. Dai, B.Y. Zhao, W. Chen, J. Tian, Z. Yang, Probabilistic failure detection for efficient distributed storage maintenance, in IEEE, Symposium on Reliable Distributed Systems, (2008)

    Google Scholar 

  10. F. Liu, L. Tian, N. Xiao, H. Jian, F. Yinjin, AA-dedupe: an application-aware source deduplication approach for cloud backup services in the personal computing environment, in IEEE International Conference on Cluster Computing, (2011)

    Google Scholar 

  11. X. Sun, T. Xu, W. Zhang, Data privacy protection using multiple cloud storages, in IEEE, International Conference on Mechatronic Sciences, Electric Engineering and Computer, (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V Madhusudhan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Madhusudhan, V., Suma, V. (2017). Preventive Maintenance Approach for Storage and Retrieval of Sensitive Data. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 516. Springer, Singapore. https://doi.org/10.1007/978-981-10-3156-4_50

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3156-4_50

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3155-7

  • Online ISBN: 978-981-10-3156-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics