z-logo
open-access-imgOpen Access
Protection of critical information in external data stores using the dissection-separation method
Author(s) -
George N Shurkhovetsky
Publication year - 2021
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/1151/1/012022
Subject(s) - encryption , cloud computing , password , computer science , computer security , field (mathematics) , simple (philosophy) , world wide web , operating system , philosophy , epistemology , pure mathematics , mathematics
Today, due to the large spread of cloud technologies, more and more individuals and businesses use their services. It is common practice in the field of cloud technologies to store in-formation (data) from one service provider in one physical and geographical location. At the same time, we must remember that the information passes through third parties whose intentions are not always known. Therefore, valuable critical information is usually encrypted before it is sent to the cloud on the user’s side. To do this, you can use both simple tools (for example, creating password-protected archives) and more advanced tools (software for creating encrypted partitions). However, in addition to normal encryption, you can use the fact that there are many unrelated repositories. Such methods include, for example, the dissection-separation method, which is discussed in this paper.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here