We present a new algorithm for message and data authentication. Some security properties are inspected and efficiency of realization inspected too.
The results of the experimental attempts of elaboration of the previously proposed method for identifying clusters belonging to JPEG files are described. Type II errors rates for different file formats are estimated. The possible ways of their improvement for some file formats are offered.
A possible application of the author’s method of differentiation of clusters belonging to JPEG files from other clusters on the digital media for expanding of existing data recovery methods is described in the work. The decrease in the number of operations needed to reach the correct result is estimated. A way of using described method for automated improvement of data carving results is considered.
Due to the fact that cloud computing bring with them new challenges in the field of information security, it is imperative for organizations to control the process of information risk management in the cloud. This paper proposes a risk assessment approach for assessing the potential damage from the attack on the implementation of components of confidential data and justify the need for the inclusion of private clouds with a high degree of protection in a hybrid cloud computing environment.
Achieving the goals of information security is a key factor in the decision to outsource information technology and, in particular, to decide on the migration of organizational data, applications, and other resources to the infrastructure, based on cloud computing. And the key issue in the selection of optimal architecture and the subsequent migration of business applications and data to the cloud organization information environment is the question of the total cost of ownership of IT infrastructure. This paper focuses on solving the problem of minimizing the total cost of ownership (TCO) cloud.