Open Access   Article Go Back

Data Security Framework for Data-Centers

Narender Kumar1 , Avinash Karhana2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-1 , Page no. 451-456, Jan-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i1.451456

Online published on Jan 31, 2019

Copyright © Narender Kumar, Avinash Karhana . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Narender Kumar, Avinash Karhana, “Data Security Framework for Data-Centers,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.451-456, 2019.

MLA Style Citation: Narender Kumar, Avinash Karhana "Data Security Framework for Data-Centers." International Journal of Computer Sciences and Engineering 7.1 (2019): 451-456.

APA Style Citation: Narender Kumar, Avinash Karhana, (2019). Data Security Framework for Data-Centers. International Journal of Computer Sciences and Engineering, 7(1), 451-456.

BibTex Style Citation:
@article{Kumar_2019,
author = {Narender Kumar, Avinash Karhana},
title = {Data Security Framework for Data-Centers},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {451-456},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3526},
doi = {https://doi.org/10.26438/ijcse/v7i1.451456}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.451456}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3526
TI - Data Security Framework for Data-Centers
T2 - International Journal of Computer Sciences and Engineering
AU - Narender Kumar, Avinash Karhana
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 451-456
IS - 1
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
2235 1395 downloads 134 downloads
  
  
           

Abstract

Data-centers play an important role in today`s time for storing and maintaining huge amounts of data being generated daily and operated in real-time, to keep this data secure becomes as much important as keeping it stored. To address the current flaws in security policy of data-centers and to eradicate those flaws this paper suggest a new security framework for data-centers. This would provide data-centers with all kind of precautions and instructions to handle most of situations that may arise during management and other data related tasks and even after breaches by defining all data storage rules by classifying data, and defining data access rights with security policies for authentication and data verification. These all things make sure that data is secured and more reliable at both aspect storage as well as data authenticity in this framework for Data-Centers.

Key-Words / Index Term

Data-center, Encryption, Data security, Immutable data, Policy, Real-time backup

References

[1] Ben M. Chen, Tong H. Lee, Kemao Peng and VenkatakrishnanVenkataramanan, “Hard Disk Drive Servo Systems”, Springer, pp. 3-8, 2006
[2] Katherine Murray, “Introduction to Personal Computers”, Que Corporation,India, pp. 11-28, 1990.
[3] B.FakhimM.BehniaS.W.ArmfieldN.Srinarayana“Cooling solutions in an operational data centre: A case study” Elsevier Applied Thermal Engineering, Volume 31, Issues 14–15, p.p 2279-2291,2011.
[4] Al-Fares, M., Loukissas, A., & Vahdat, A. “A scalable, commodity data center network architecture” ACM SIGCOMM Computer Communication Review, 38(4),p.p 63-74,2008.
[5] S. Mittal, “Power management techniques for data centers: A survey,” CoRR, vol. abs/1404.6681, 2014.
[6] Knapp, K. J., Denney, G. D., & Barner, M. E. "Key issues in data center security: An investigation of government audit reports". Government Information Quarterly, 28(4), p.p 533–541,2011.
[7] Maurizio Portolani, Mauricio Arregoces. "Data Center Fundamentals". Publishers, Cisco Press, 800 East 96th Street Indianapolis, IN 46240 USA,2004.
[8] “A Matrix of Security Risks and Solutions"Oracle9i Security Overview, Release 2 (9.2)Oracle Docs.",2002.
[9] The University of Kansas Policy Library."Data Classification and Handling Policy", 2014.
[10] "Data Center Access Policy" Information Technology Services, West Virginia University, 2018.
[11] Laurens Van Houtven, "Crypto 101" Creative Comons,2013.
[12] Diffie, W., & Hellman, M. "New directions in cryptography". IEEE Transactions on Information Theory, 22(6),p.p 644–654,1976.
[13] Jonathan Katz Yehuda Lindell - "Introduction to Modern Cryptography_ Principles and Protocols",Chapman And Hall/CRC, p.p 241-245, 2007.
[14] Tadayoshi Kohno, Niels Ferguson, Bruce Schneier -"Cryptography Engineering Design Principles and practical applications" Wiley Publishing Inc.,2010.
[15] Goldreich O - "Foundations of cryptography", Now Publishers Inc. 2001.