Research on Data Destruction Mechanism with Security Level in HDFS

Article Preview

Abstract:

In cloud computing applications, the data security is a primary concern of user. In this paper, for the problem that data of the HDFS cannot be destroyed completely in open source cloud storage system, which may lead to data leakage, it designs a destruction mechanism of HDFS with multiple security level. This mechanism make data effectively destroyed by the method of data overwrite which makes a balance between security requirements and performance requirements. The Simulation experiments show that the mechanism can override a Block file in HDFS environment effectively to achieve the purpose of data destroying. At the same the overhead of different overwrite algorithm is different also which can ensure the security and efficiency is balanced.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 834-836)

Pages:

1795-1798

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Cloud Security Alliance. About[EB/OL]. https: /cloudsecurityalliance. org/about/, 2012-12-01.

Google Scholar

[2] FENG Deng Guo, ZHANG Min, ZHANG Yan, etal. Journal of Software, 2011, 22(1): 71− 83.

Google Scholar

[3] ZISSIS D, LEKKAS D. Future Generation Computer Systems, 2012, 28(3): 583-592.

DOI: 10.1016/j.future.2010.12.006

Google Scholar

[4] WANG L, VON LASZEWSKI G, YOUNGE A, etal. New Generation Computing, 2010, 28(2): 137-146.

Google Scholar

[5] The Apache Software Foundation. HDFS users guide [EB/OL]. [2012-03-30]. http: /hadoop. apache. org/common/docs/current/hdfs_user_guide. pdf.

Google Scholar

[6] Zhang Dong. Big storage II [M]. Beijing: tsinghua university press, 2011. 50-51.

Google Scholar

[7] Cheng Yu. Magnetic medium data disposal technology research [D]. Chengdu: university of electronic science and technology( 2010).

Google Scholar

[8] BEDRA A. IEEE Internet Computing, 2010, 14(4): 85-88.

Google Scholar