Distribution of encrypted information in multiple locations

作者: Gianluca Della Corte , Alessandro Donatelli , Antonio M. Sgro

DOI:

关键词: Real-time computingEncryptionComputer networkComputer scienceBlock (telecommunications)

摘要: A method, system, and/or computer program product stores information in a distributed data-processing environment. The method comprises: encrypting, by one or more processors, piece of information; splitting, the encrypted into at least first block and second block, part said being required for decrypting block; distributing, storing location; location.

参考文章(25)
David James Armour, Yuan Zheng, John David Welch, Erik Stefan Nyström, Stephen Jason Baron, Application migration between clouds ,(2012)
Edward Chin, Albert French, David Dodgson, Ralph R. Farina, Joseph Neill, Robert Johnson, Scott Summers, Storage security using cryptographic splitting ,(2008)
David J. Armour, Yuan Zheng, John David Welch, Richard O. Rundle, Cloud bursting and management of cloud-bursted applications ,(2013)
Nduwuisi Emuchay, Howard N. Anglin, Wing L. Leung, Cloud Data Management ,(2010)
Rahul V. Auradkar, Roy Peter D'souza, Trusted cloud computing and services framework ,(2010)
Michael V. Gentry, Peter E. Clark, Michael C. Hudgins, Michael G. Metzger, Tracy Wayne Shelby, James Robert Mock, Devin Todd Sherry, Secure processing of secure information in a non-secure environment ,(2007)
Christopher D. Watkins, Donald E. Martin, Walter H. Runkis, Secure storage and accelerated transmission of information over communication networks ,(2010)