Data Protection: Combining Fragmentation, Encryption, and Dispersion

被引:0
作者
Memmi, Gerard [1 ]
Kapusta, Katarzyna [1 ]
Qiu, Han [1 ]
机构
[1] Telecom ParisTech, CNRS, LTCI, UMR 5141, Paris, France
来源
2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC) | 2015年
关键词
Data protection; information protection; fragmentation; defragmentation; data dispersion; encryption; selective encryption; image encryption; GPU; database; privacy;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we first present a general description of what is a fragmentation system including a number of high level requirements. Then, we focus on fragmentation of two kinds of data. First, a bitmap image is split in two parts a public one and a private one. We describe two processes and address the question of performance. Then, we survey works on fragmentation of text: in a brute force manner then considering data stored in a structured database.
引用
收藏
页数:9
相关论文
共 19 条
[1]  
Aggarwal G., 2005, P 2 BIENN C INN DAT, P186
[2]  
[Anonymous], 2009, EUR J SCI RES
[3]  
Bessani A., 2011, EUROSYS 11
[4]  
Bkakria Anis, 2013, Information and Communication Technology. International Conference, ICT-EurAsia 2013. Proceedings: LNCS 7804, P426, DOI 10.1007/978-3-642-36818-9_47
[5]  
Ciriani V., 2010, ACM T INF SYS SECURI
[6]  
Fabre J.-C., 1994, Dependable Computing - EDCC-1. First European Dependable Computing Conference Proceedings, P21
[7]  
Fray J.-M., 1986, Proceedings of the 1986 IEEE Symposium on Security and Privacy (Cat. No.86CH2292-1), P194
[8]  
Hudic A., 2012, INT J COMM NETWORKS, V1
[9]  
Kapusta K., 2015, DATA PROTECTION MEAN
[10]   Performance study of selective encryption in comparison to full encryption for still visual images [J].
Khashan, Osama A. ;
Zin, Abdullah M. ;
Sundararajan, Elankovan A. .
JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2014, 15 (06) :435-444