Data Protection: Combining Fragmentation, Encryption, and Dispersion

被引:0
作者
Memmi, Gerard [1 ]
Kapusta, Katarzyna [1 ]
Qiu, Han [1 ]
机构
[1] Telecom ParisTech, CNRS, LTCI, UMR 5141, Paris, France
来源
2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC) | 2015年
关键词
Data protection; information protection; fragmentation; defragmentation; data dispersion; encryption; selective encryption; image encryption; GPU; database; privacy;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we first present a general description of what is a fragmentation system including a number of high level requirements. Then, we focus on fragmentation of two kinds of data. First, a bitmap image is split in two parts a public one and a private one. We describe two processes and address the question of performance. Then, we survey works on fragmentation of text: in a brute force manner then considering data stored in a structured database.
引用
收藏
页数:9
相关论文
共 19 条
[11]   Overview on selective encryption of image and video: Challenges and perspectives [J].
Massoudi A. ;
Lefebvre F. ;
De Vleeschouwer C. ;
MacQ B. ;
Quisquater J.-J. .
EURASIP Journal on Information Security, 2008 (1)
[12]   Secure and low cost selective encryption for JPEG2000 [J].
Massoudi, Ayoub ;
Lefebvre, Frederic ;
De Vleeschouwer, Christophe ;
Devaux, Francois-Olivier .
ISM: 2008 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, 2008, :31-38
[13]  
Qiu H., 2014, IEEE ISM 14
[14]   Fast Selective Encryption Methods for Bitmap Images [J].
Qiu, Han ;
Memmi, Gerard .
INTERNATIONAL JOURNAL OF MULTIMEDIA DATA ENGINEERING & MANAGEMENT, 2015, 6 (03) :51-69
[15]  
Storer M. W., 2009, ACM T STORAGE, V5
[16]  
Subbiah A., 2005, STORAGESS 05, P84
[17]  
Tiejun Zhang, 2013, 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC 2013), P198, DOI 10.1109/IHMSC.2013.195
[18]  
Uhl A., 2005, ADV INF SEC
[19]  
Vimercati S., 2013, FOUNDATIONS OF SECUR, VVII, P212