Data Security

نویسندگان

  • CM
  • Antonia J. Jones
چکیده

electronically as pdf Acrobat files. It is not normally necessary for students attending the course to print this file as complete sets of printed slides will be issued. ©2001 Antonia J. Jones. Permission is hereby granted to any web surfer for downloading, printing and use of this material for personal study only. Copyright permission is explicitly withheld for modification, re-circulation or publication by any other means, or commercial exploitation in any manner whatsoever, of this file or the material therein. Recommended texts: Other useful references: There are other books on coding theory in the library by R. W. Hamming, J. van Lint and R. J. McEliece. These are more advanced than the recommended texts. The outstanding modern cryptographic reference is B. Schneider. Fills in many aspects of the present course and goes on to discuss mail and internet security. The classic 1,200 page definitive story of cryptography up to the late 1950's is: A recent very interesting account including the history of RSA and PGP and a non-technical discussion of quantum cryptography is: Note: entries marked with an asterisk (*) will not be examinable and will be discussed briefly as time permits. Security Computer security involves all aspects of data security including Physical security. Protection of the equipment and data against accidental or deliberate damage, including theft. Logical security. Protection of the software and hardware against accidental or deliberate modification. Correctness. Correctness of programs means ensuring that the programs do what they are supposed to do under all circumstances. Operating system security. Really part of logical security but practical security considerations make this a specialised discipline in its own right. In this course we shall look at data security and logical security in general but not operating system security. We shall also not cover physical security nor the problems of proving correctness of programs. 7 Encrypted error corrected noisy channel Encrypted error corrected noisy channel Encrypted channel Figure 1 Different types of communication channels. After a brief discussion of general principles of security we shall consider methods of protecting data, which is being stored or transmitted, from accidental corruption. A standard method for achieving this is by the use of error detecting and error correcting codes. Later we shall consider the different problem of protecting the confidentiality of data, i.e. of ensuring that it can only be read by the people or machines for whom it is intended. 8 This …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996