You are on page 1of 2

1.

GOAL AND PROBLEM STATEMENTS

2.1 GOAL STATEMENT

The extreme goal of this work is How to effectively select the best security scheme
for stored data under different environments? Due to large number of potential
solutions available, it is not easy for a prospective customer to identify the best
suitable approach for his/her multimedia requirements. This paper gives an
overview of the prominent characteristics of several systems to provide a
foundation for selecting the most appropriate solution.

2.2 PROBLEM STATEMENT

For protecting Multimedia Data in Storage, Many potential schemes are developed
for ensuring information confidentiality, integrity, and availability without
substantially degrading performance. In order to choose the best security scheme,
users must have proper knowledge about of the primary security features available
in the storage security community and then be able to quantifiably compare the
systems. So, How to classify various storage schemes and to compare their
performance? In attacking this problem, we are confronted with the following
challenges that should be addressed.

• How to properly weigh the costs and benefits associated with these security
measures?
• How to compare the methods based on confidentiality, integrity, availability
and performance?
• What are the major differences between all the methods?
• What are the Specific applications of storage devices in the multimedia
environment?

1. BACK GROUND AND RELATED WORK

This section briefly explains about common set of criteria for evaluating a storage
security system i.e. confidentiality, integrity, availability, and performance.

Confidentiality

Ensuring confidentiality means that no one has access to data unless


specifically authorized. The first step in authorizing access to information is to
properly identify users via authentication. The storage system must define the
means for a user to be properly identified prior to gaining access, and then having
appropriately identified a user, the system must allow access to only specified data
associated with that user. The system must encrypt data and, therefore, requires
either users or servers to apply cryptographic keys. Determining how the keys are
managed has had a significant impact on the overall design. And also once the
system determines to revoke a particular user’s access, the user’s keys must no
longer work within the system, or at a minimum not allow access to future versions
of the files.

You might also like