Flexible data distribution policy language and gateway architecture

@article{Spillner2012FlexibleDD,
  title={Flexible data distribution policy language and gateway architecture},
  author={Josef Spillner and Alexander Schill},
  journal={2012 IEEE Latin America Conference on Cloud Computing and Communications (LatinCloud)},
  year={2012},
  pages={1-6},
  url={https://api.semanticscholar.org/CorpusID:16839846}
}
The Flexible Data Distribution Policy Language (FlexDDPL) is introduced to formulate storage policies, evaluate it against language design guidelines, and demonstrate its practical usability within a dispersing cloud storage gateway architecture.

Figures and Tables from this paper

Expressive Data Storage Policies for Multi-cloud Storage Configurations

A more expressive way to specify storage policies is presented, that involves enriching the configuration models with metadata about the technical capabilities of the storage systems, referring to the desired capabilities ofThe storage system in the storage policies, and leaving actual resolution to the policy engine.

Orchestration of Distributed Storage Targets through Storage Flows

With Storage Flows, a new concept to manage distributed storage flows through systematic orchestration is proposed, which connects clients flexibly with intermediate data pre-processing tasks and finally the storage targets.

Tutorial on Distributed Data Storage: From Dispersed Files to Stealth Databases

This tutorial introduces research results and prototypical tools for next-generation distributed cloud storage and processing applications for elastic cloud storage techniques.

A Data Location Control Model for Cloud Service Deployments

An enhancement to the model is proposed that alters its behaviour from being restrictive to prescriptive so that Cloud providers can copy data to a non-preferred locations in case of emergency, and the number of authorized vs unauthorized transfers can be made publicly available by the provider as an assurance measure for consumers.

Conceptualized Policy Design for User-Regulated Trusted Clouds

A conceptual approach to establish a chain of policy by using hardware-oriented root of trust and the main principles to enforce regulations accurately for each architectural cloud layer based on an established chain of trust are outlined.

A User Data Location Control Model for Cloud Services

A data location control model for Cloud services is presented that uses an authorization system as its core control element and provides the data owner with an interface that allows their location preferences to be expressed.

NubiVis: a personal cloud file explorer

This work introduces and demonstrates NubiVis, a web-based tool for exploring and managing personal files stored in arbitrary locations with a unified view that enables users to execute control over where their files are stored by simulated and actual exclusion of storage providers.

User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things

UPECSI enables enforcement of all privacy requirements of the user once her sensitive data leaves the border of her network, provides a novel approach for the integration of privacy functionality into the development process of cloud-based services, and offers the user an adaptable and transparent configuration of her privacy requirements.

SecCSIE: A Secure Cloud Storage Integrator for Enterprises

This work describes a work in progress and proposes a flexible system architecture for integrating various types of cloud storage providers into an employee's desktop computer without giving up data security, which turns out to be very versatile and provides high levels of data confidentiality, integrity, and availability.

DepSky: dependable and secure storage in a cloud-of-clouds

This paper presents DEPSKY, a system that improves the availability, integrity and confidentiality of information stored in the cloud through the encryption, encoding and replication of the data on diverse clouds that form a cloud-of-clouds.

An introduction to the Web Services Policy Language (WSPL)

    A. Anderson
    Computer Science
  • 2004
The Web Services Policy Language (WSPL), a strict subset of the OASIS eXtensible Access Control Markup Language (XACML) Standard, is suitable for specifying a wide range of policies, including authorization, quality-of-service, quality of protection, reliable messaging, privacy, and application-specific service options.

Enforcing Multi-user Access Policies to Encrypted Cloud Databases

This demo shows the implementation of a scheme that allows making SQL-like queries on encrypted databases in a multi-user setting, while at the same time allowing the database owner to assign different access rights to users.

On the Benefits of Transparent Compression for Cost-Effective Cloud Data Storage

    Bogdan Nicolae
    Computer Science, Engineering
  • 2011
This paper evaluates the trade-off resulting from transparently applying data compression to conserve storage space and bandwidth at the cost of slight computational overhead, and achieves large reductions of bandwidth and storage space utilization with minimal impact on data access performance.

The Design and Implementation of Elastic Quotas: A System for Flexible File System Management

An elastic quota system is implemented in Solaris that allows all users to use unlimited amounts of available disk space while still providing system administrators the ability to control how the disk space is allocated among users.

Distributed Data Management for Grid Computing

This chapter discusses data management in a Data Grid, which involves integrating Enterprise Application/Information Integration in Grid, and the evolution of the Relational Model, as well as use cases.

Improving Scientific Workflow Performance Using Policy Based Data Placement

The integration of the Pegasus Workflow Management System with a Policy Based Data Placement Service (PDPS) is presented to reduce overall workflow execution time and the influence of PDPS on the overall workflow runtimes is dependent on the data characteristics of the executable workflow and the data placement policy being enforced.