scholarly journals Design of Concept and Draft Scenarios of DLP for DataLake based on Abyss Distributed Storage

10.29007/dsmz ◽  
2020 ◽  
Author(s):  
Byungrae Cha ◽  
Sun Park ◽  
ByeongChun Shin ◽  
Sun-Kuk Noh ◽  
JongWon Kim

Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. The software and tools of DLP monitor and control endpoint activities, filter data streams on corporate networks, and monitor data in the cloud to protect data at rest, in motion, and in use. And in this study, we have designed the concept and draft scenarios of DLP for DataLake based on Abyss distributed storage cluster.

Author(s):  
Basheer Husham Ali ◽  
Ahmed Adeeb Jalal ◽  
Wasseem N. Ibrahem Al-Obaydy Al-Obaydy

Sensitive data may be stored in different forms. Not only legal owners but also malicious people are interesting of getting sensitive data. Exposing valuable data to others leads to severe Consequences. Customers, organizations, and /or companies lose their money and reputation due to data breaches. There are many reasons for data leakages. Internal threats such as human mistakes and external threats such as DDoS attacks are two main reasons for data loss. In general, data may be categorized based into three kinds: data in use, data at rest, and data in motion. Data Loss Prevention (DLP) are good tools to identify important data. DLP can do analysis for data content and send feedback to administrators to make decision such as filtering, deleting, or encryption. Data Loss Prevention (DLP) tools are not a final solution for data breaches, but they consider good security tools to eliminate malicious activities and protect sensitive information. There are many kinds of DLP techniques, and approximation matching is one of them. Mrsh-v2 is one type of approximation matching. It is implemented and evaluated by using TS dataset and confusion matrix. Finally, Mrsh-v2 has high score of true positive and sensitivity, and it has low score of false negative.


2021 ◽  
Vol 59 (1) ◽  
pp. 1-20
Author(s):  
Cédric Jourde ◽  
Marie Brossier ◽  
Muriel Gomez-Perez

ABSTRACTThis article analyses how the state in Senegal has managed the hajj since the liberalisation era in the early 2000s. Although the essence of the hajj is religious, it is also deeply political and requires that the state manages complex relations with pilgrims, religious leaders, private travel agencies, politicians and Saudi authorities. This article argues that three inter-related imperatives structure the conduct of the Senegalese state: a security imperative, a legitimation imperative, and a clientelistic imperative. Security concerns lead the state to monitor and control pilgrims travelling to Mecca. Legitimation is seen in the collaborative relations with Sûfi orders and in the framing of the hajj organisation as a ‘public service’. Finally, given the magnitude of financial and symbolic resources attached to the hajj, clientelistic relations are constitutive of state officials’ actions. Overall, despite the post-2000 liberalisation of the hajj, the state has maintained its role as a gatekeeper, regulator and supervisor.


2014 ◽  
Vol 918 ◽  
pp. 295-300
Author(s):  
Peng Fei You ◽  
Yu Xing Peng ◽  
Zhen Huang ◽  
Chang Jian Wang

In distributed storage systems, erasure codes represent an attractive data redundancy solution which can provide the same reliability as replication requiring much less storage space. Multiple data losses happens usually and the lost data should be regenerated to maintain data redundancy in distributed storage systems. Regeneration for multiple data losses is expected to be finished as soon as possible, because the regeneration time can influence the data reliability and availability of distributed storage systems. However, multiple data losses is usually regenerated by regenerating single data loss one by one, which brings high entire regeneration time and severely reduces the data reliability and availability of distributed storage systems. In this paper, we propose a tree-structured parallel regeneration scheme based on regenerating codes (TPRORC) for multiple data losses in distributed storage systems. In our scheme, multiple regeneration trees based on regenerating code are constructed. Firstly, these trees are created independently, each of which dose not share any edges from the others and is responsible for one data loss; secondly, every regeneration tree based on regenerating codes owns the least network traffic and bandwidth optimized-paths for regenerating its data loss. Thus it can perform parallel regeneration for multiple data losses by using multiple optimized topology trees, in which network bandwidth is utilized efficiently and entire regeneration is overlapped. Our simulation results show that the tree-structured parallel regeneration scheme reduces the regeneration time significantly, compared to other regular regeneration schemes.


2011 ◽  
Vol 20 (07) ◽  
pp. 1211-1230 ◽  
Author(s):  
HYUN SANG CHO ◽  
TAKEKAZU KATO ◽  
TATSUYA YAMAZAKI ◽  
MINSOO HAHN

The home network is one of the emerging areas from the last century. However, the growth of the home network market is stationary at present. This paper describes the limitations of the home network system and the requirements for overcoming the current limitations. Also described is a new home network service system known as COWS and its easy installation and scalable operation. COWS consists of power consumption monitor and control devices along with a service server that is a complementary combination of Open Service Gateway initiative (OSGi) and web services. A home network system has a dynamic, heterogeneous, distributed, and scalable topology. Service Oriented Architecture (SOA) has been proposed as a solution that satisfies the requirement of a home network, and OSGi and web services are two successful SOA-based frameworks. An included service server has a flexible architecture that consists of a core and extendable service packages. A power consumption monitor and control function provides useful context information for activity-based context-aware services and optimizes the power consumption. The system can be installed easily into existing and new houses to solve the current barrier of the popularization of home network services.


2002 ◽  
Author(s):  
Ryusuke Ogasawara ◽  
George Kosugi ◽  
Tadafumi Takata ◽  
Masafumi Yagi ◽  
Yoshihiro Chikada ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document