首页 > 最新文献

ACM International Workshop on Storage Security And Survivability最新文献

英文 中文
Disaster recovery codes: increasing reliability with large-stripe erasure correcting codes 容灾码:采用大条带擦除纠错码,提高可靠性
Pub Date : 2007-10-29 DOI: 10.1145/1314313.1314322
K. Greenan, E. L. Miller, T. Schwarz, D. Long
Large-scale storage systems need to provide the right amount of redundancy in their storage scheme to protect client data. In particular, many high-performance systems require data protection that imposes minimal impact on performance; thus, such systems use mirroring to guard against data loss. Unfortunately, as the number of copies increases, mirroring becomes costly and contributes relatively little to the overall system reliability. Compared to mirroring, parity-based schemes are space-efficient, but incur greater update and degraded-mode read costs. An ideal data protection scheme should perform similarly to mirroring, while providing the space efficiency of a parity-based erasure code. Our goal is to increase the reliability of systems that currently mirror data for protection without impacting performance or space overhead. To this end, we propose the use of large parity codes across two-way mirrored reliability groups. The secondary reliability groups are defined across an arbitrarily large set of mirrored groups, necessitating a small amount of non-volatile RAM for parity. Since each parity element is stored in non-volatile RAM, our scheme drastically increases the mean time to data loss without impacting overall system performance.
大型存储系统需要在其存储方案中提供适当的冗余,以保护客户端数据。特别是,许多高性能系统需要对性能影响最小的数据保护;因此,这样的系统使用镜像来防止数据丢失。不幸的是,随着副本数量的增加,镜像的成本越来越高,而且对整个系统可靠性的贡献相对较小。与镜像相比,基于奇偶校验的方案具有空间效率,但会产生更高的更新和降级模式读取成本。理想的数据保护方案应该执行类似于镜像的功能,同时提供基于奇偶校验的擦除码的空间效率。我们的目标是在不影响性能或空间开销的情况下,提高当前镜像数据保护系统的可靠性。为此,我们建议在双向镜像可靠性组中使用较大的奇偶校验码。次要可靠性组是在任意大的镜像组集上定义的,因此需要少量的非易失性RAM来进行奇偶校验。由于每个奇偶校验元素都存储在非易失性RAM中,因此我们的方案大大增加了数据丢失的平均时间,而不会影响整体系统性能。
{"title":"Disaster recovery codes: increasing reliability with large-stripe erasure correcting codes","authors":"K. Greenan, E. L. Miller, T. Schwarz, D. Long","doi":"10.1145/1314313.1314322","DOIUrl":"https://doi.org/10.1145/1314313.1314322","url":null,"abstract":"Large-scale storage systems need to provide the right amount of redundancy in their storage scheme to protect client data. In particular, many high-performance systems require data protection that imposes minimal impact on performance; thus, such systems use mirroring to guard against data loss. Unfortunately, as the number of copies increases, mirroring becomes costly and contributes relatively little to the overall system reliability. Compared to mirroring, parity-based schemes are space-efficient, but incur greater update and degraded-mode read costs. An ideal data protection scheme should perform similarly to mirroring, while providing the space efficiency of a parity-based erasure code.\u0000 Our goal is to increase the reliability of systems that currently mirror data for protection without impacting performance or space overhead. To this end, we propose the use of large parity codes across two-way mirrored reliability groups. The secondary reliability groups are defined across an arbitrarily large set of mirrored groups, necessitating a small amount of non-volatile RAM for parity. Since each parity element is stored in non-volatile RAM, our scheme drastically increases the mean time to data loss without impacting overall system performance.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127901128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
The effects of metadata corruption on nfs 元数据损坏对nfs的影响
Pub Date : 2007-10-29 DOI: 10.1145/1314313.1314324
S. Krishnan, Giridhar Ravipati, A. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, B. Miller
Distributed file systems need to be robust in the face of failures. In this work, we study the failure handling and recovery mechanisms of a widely used distributed file system, Linux NFS. We study the behavior of NFS under corruption of important metadata through fault injection. We find that the NFS protocol behaves in unexpected ways in the presence of these corruptions. On some occasions, incorrect errors are communicated to the client application; inothers, the system hangs applications or crashes outright; in a few cases, success is falsely reported when an operation has failed. We use the results of our study to draw lessons for future designs and implementations of the NFS protocol.
分布式文件系统需要在面对故障时保持健壮。在这项工作中,我们研究了广泛使用的分布式文件系统Linux NFS的故障处理和恢复机制。研究了通过故障注入破坏重要元数据时NFS的行为。我们发现,在存在这些损坏的情况下,NFS协议会以意想不到的方式运行。在某些情况下,不正确的错误被传递给客户端应用程序;在其他情况下,系统挂起应用程序或彻底崩溃;在少数情况下,当操作失败时,会错误地报告成功。我们利用研究结果为NFS协议的未来设计和实现提供经验教训。
{"title":"The effects of metadata corruption on nfs","authors":"S. Krishnan, Giridhar Ravipati, A. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, B. Miller","doi":"10.1145/1314313.1314324","DOIUrl":"https://doi.org/10.1145/1314313.1314324","url":null,"abstract":"Distributed file systems need to be robust in the face of failures. In this work, we study the failure handling and recovery mechanisms of a widely used distributed file system, Linux NFS. We study the behavior of NFS under corruption of important metadata through fault injection. We find that the NFS protocol behaves in unexpected ways in the presence of these corruptions. On some occasions, incorrect errors are communicated to the client application; inothers, the system hangs applications or crashes outright; in a few cases, success is falsely reported when an operation has failed. We use the results of our study to draw lessons for future designs and implementations of the NFS protocol.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"393 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125718531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Confidentiality-preserving rank-ordered search 保密性等级排序搜索
Pub Date : 2007-10-29 DOI: 10.1145/1314313.1314316
A. Swaminathan, Yinian Mao, Guan-Ming Su, Hongmei Gou, Avinash L. Varna, Shan He, Min Wu, Douglas W. Oard
This paper introduces a new framework for confidentiality preserving rank-ordered search and retrieval over large document collections. The proposed framework not only protects document/query confidentiality against an outside intruder, but also prevents an untrusted data center from learning information about the query and the document collection. We present practical techniques for proper integration of relevance scoring methods and cryptographic techniques, such as order preserving encryption, to protect data collections and indices and provide efficient and accurate search capabilities to securely rank-order documents in response to a query. Experimental results on the W3C collection show that these techniques have comparable performance to conventional search systems designed for non-encrypted data in terms of search accuracy. The proposed methods thus form the first steps to bring together advanced information retrieval and secure search capabilities for a wide range of applications including managing data in government and business operations, enabling scholarly study of sensitive data, and facilitating the document discovery process in litigation.
本文介绍了一种新的保密框架,用于大型文档集合的排序搜索和检索。所提出的框架不仅可以保护文档/查询的机密性免受外部入侵者的攻击,还可以防止不受信任的数据中心了解有关查询和文档集合的信息。我们提出了将相关评分方法和加密技术(如保序加密)适当集成的实用技术,以保护数据集合和索引,并提供有效和准确的搜索功能,以根据查询安全地对文档进行排序。在W3C集合上的实验结果表明,就搜索准确性而言,这些技术与为非加密数据设计的传统搜索系统具有相当的性能。因此,建议的方法构成了将先进的信息检索和安全搜索功能结合在一起的第一步,这些功能适用于广泛的应用,包括管理政府和商业运作中的数据,使敏感数据的学术研究成为可能,以及促进诉讼中的文件发现过程。
{"title":"Confidentiality-preserving rank-ordered search","authors":"A. Swaminathan, Yinian Mao, Guan-Ming Su, Hongmei Gou, Avinash L. Varna, Shan He, Min Wu, Douglas W. Oard","doi":"10.1145/1314313.1314316","DOIUrl":"https://doi.org/10.1145/1314313.1314316","url":null,"abstract":"This paper introduces a new framework for confidentiality preserving rank-ordered search and retrieval over large document collections. The proposed framework not only protects document/query confidentiality against an outside intruder, but also prevents an untrusted data center from learning information about the query and the document collection. We present practical techniques for proper integration of relevance scoring methods and cryptographic techniques, such as order preserving encryption, to protect data collections and indices and provide efficient and accurate search capabilities to securely rank-order documents in response to a query. Experimental results on the W3C collection show that these techniques have comparable performance to conventional search systems designed for non-encrypted data in terms of search accuracy. The proposed methods thus form the first steps to bring together advanced information retrieval and secure search capabilities for a wide range of applications including managing data in government and business operations, enabling scholarly study of sensitive data, and facilitating the document discovery process in litigation.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122281169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 208
Introducing secure provenance: problems and challenges 引入安全来源:问题和挑战
Pub Date : 2007-10-29 DOI: 10.1145/1314313.1314318
Ragib Hasan, R. Sion, M. Winslett
Data provenance summarizes the history of the ownership of the item, as well as the actions performed on it. While widely used in archives, art, and archeology, provenance is also very important in forensics, scientific computing, and legal proceedings involving data. Significant research has been conducted in this area, yet the security and privacy issues of provenance have not been explored. In this position paper, we define the secure provenance problem and argue that it is of vital importance in numerous applications. We then discuss a select few of the issues related to ensuring the privacy and integrity of provenance information.
数据来源总结了项目所有权的历史,以及对其执行的操作。虽然在档案、艺术和考古中广泛使用,但在法医学、科学计算和涉及数据的法律诉讼中也非常重要。在这一领域进行了大量的研究,但尚未探讨来源的安全和隐私问题。在本文中,我们定义了安全来源问题,并认为它在许多应用中都是至关重要的。然后,我们将讨论与确保来源信息的隐私性和完整性相关的几个问题。
{"title":"Introducing secure provenance: problems and challenges","authors":"Ragib Hasan, R. Sion, M. Winslett","doi":"10.1145/1314313.1314318","DOIUrl":"https://doi.org/10.1145/1314313.1314318","url":null,"abstract":"Data provenance summarizes the history of the ownership of the item, as well as the actions performed on it. While widely used in archives, art, and archeology, provenance is also very important in forensics, scientific computing, and legal proceedings involving data. Significant research has been conducted in this area, yet the security and privacy issues of provenance have not been explored. In this position paper, we define the secure provenance problem and argue that it is of vital importance in numerous applications. We then discuss a select few of the issues related to ensuring the privacy and integrity of provenance information.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128688127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 143
Access control for a replica management database 副本管理数据库的访问控制
Pub Date : 2006-10-30 DOI: 10.1145/1179559.1179567
J. Wozniak, P. Brenner, D. Thain
Distributed computation systems have become an important tool for scientific simulation, and a similarly distributed replica management system may be employed to increase the locality and availability of storage services. While users of such systems may have low expectations regarding the security and reliability of the computation involved, they expect that committed data sets resulting from complete jobs will be protected against storage faults, accidents and intrusion. We offer a solution to the distributed storage security problem that has no global view on user names or authentication specifics. Access control is handled by a rendition protocol, which is similar to a rendezvous protocol but is driven by the capability of the client user to effect change in the data on the underlying storage. In this paper, we discuss the benefits and liabilities of such a system.
分布式计算系统已经成为科学仿真的重要工具,类似的分布式副本管理系统可以用来提高存储服务的局部性和可用性。虽然这些系统的用户可能对所涉及的计算的安全性和可靠性期望不高,但他们希望完成作业后提交的数据集能够受到保护,免受存储故障、事故和入侵的影响。我们提供了一个分布式存储安全问题的解决方案,它没有用户名或身份验证细节的全局视图。访问控制由再现协议处理,再现协议类似于会合协议,但由客户机用户对底层存储上的数据进行更改的能力驱动。在本文中,我们讨论了这样一个系统的好处和缺点。
{"title":"Access control for a replica management database","authors":"J. Wozniak, P. Brenner, D. Thain","doi":"10.1145/1179559.1179567","DOIUrl":"https://doi.org/10.1145/1179559.1179567","url":null,"abstract":"Distributed computation systems have become an important tool for scientific simulation, and a similarly distributed replica management system may be employed to increase the locality and availability of storage services. While users of such systems may have low expectations regarding the security and reliability of the computation involved, they expect that committed data sets resulting from complete jobs will be protected against storage faults, accidents and intrusion. We offer a solution to the distributed storage security problem that has no global view on user names or authentication specifics. Access control is handled by a rendition protocol, which is similar to a rendezvous protocol but is driven by the capability of the client user to effect change in the data on the underlying storage. In this paper, we discuss the benefits and liabilities of such a system.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114748227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Long-term threats to secure archives 档案安全的长期威胁
Pub Date : 2006-10-30 DOI: 10.1145/1179559.1179562
M. Storer, K. Greenan, E. L. Miller
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to traditional storage systems in which data lifetimes are measured in months or possibly years, data lifetimes in an archival system are measured in decades. Secure archival storage has the added goal of providing controlled access to its long-term contents. In contrast, public archival systems aim to ensure that their contents are available to anyone.Since secure archival storage systems must store data over much longer periods of time, new threats emerge that affect the security landscape in many novel, subtle ways. These security threats endanger the secrecy, availability and integrity of the archival storage contents. Adequate understanding of these threats is essential to effectively devise new policies and mechanisms to guard against them. We discuss many of these threats in this new context to fill this gap, and show how existing systems meet (or fail to meet) these threats.
档案存储系统是为“一次写,可能读”的使用模式而设计的,这种模式强调数据内容的长期保存。传统存储系统的数据生命周期以月或年为单位,而归档系统的数据生命周期以几十年为单位。安全档案存储的另一个目标是提供对其长期内容的受控访问。相比之下,公共档案系统旨在确保任何人都能获得其内容。由于安全档案存储系统必须在更长的时间内存储数据,因此出现了以许多新颖、微妙的方式影响安全环境的新威胁。这些安全威胁危及档案存储内容的保密性、可用性和完整性。充分了解这些威胁对于有效地制定新的政策和机制来防范这些威胁至关重要。我们将在这个新的上下文中讨论其中的许多威胁,以填补这一空白,并展示现有系统如何满足(或无法满足)这些威胁。
{"title":"Long-term threats to secure archives","authors":"M. Storer, K. Greenan, E. L. Miller","doi":"10.1145/1179559.1179562","DOIUrl":"https://doi.org/10.1145/1179559.1179562","url":null,"abstract":"Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to traditional storage systems in which data lifetimes are measured in months or possibly years, data lifetimes in an archival system are measured in decades. Secure archival storage has the added goal of providing controlled access to its long-term contents. In contrast, public archival systems aim to ensure that their contents are available to anyone.Since secure archival storage systems must store data over much longer periods of time, new threats emerge that affect the security landscape in many novel, subtle ways. These security threats endanger the secrecy, availability and integrity of the archival storage contents. Adequate understanding of these threats is essential to effectively devise new policies and mechanisms to guard against them. We discuss many of these threats in this new context to fill this gap, and show how existing systems meet (or fail to meet) these threats.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126005844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
The case for semantic aware remote replication 语义感知远程复制的案例
Pub Date : 2006-10-30 DOI: 10.1145/1179559.1179575
Xiaotao Liu, Gal Niv, P. Shenoy, Kadangode K. Ramakrishnan, J. Merwe
This paper argues that the network latency due to synchronous replication is no longer tolerable in scenarios where businesses are required by regulation to separate their secondary sites from the primary by hundreds of miles. We propose a semantic-aware remote replication system to meet the contrasting needs of both system efficiency and safe remote replication with tight recovery-point and recovery-time objectives. Using experiments conducted on a commercial replication system and on a Linux file system we show that (i) unlike synchronous replication, asynchronous replication is relatively insensitive to network latency, and (ii) applications such as databases already intelligently deal with the weak persistency semantics offered by modern file systems. Our proposed system attempts to use asynchronous replication whenever possible and uses application/file-system "signals" to maintain synchrony between the primary and secondary sites. We present a high-level design of our system and discuss several potential challenges that need to be addressed in such a system.
本文认为,在法规要求企业将其次要站点与主站点分开数百英里的情况下,同步复制造成的网络延迟不再是可以容忍的。本文提出了一种语义感知远程复制系统,以满足系统效率和安全远程复制的对比需求,具有严格的恢复点和恢复时间目标。通过在商业复制系统和Linux文件系统上进行的实验,我们表明:(i)与同步复制不同,异步复制对网络延迟相对不敏感,(ii)数据库等应用程序已经能够智能地处理现代文件系统提供的弱持久性语义。我们建议的系统尽可能使用异步复制,并使用应用程序/文件系统“信号”来维持主从站点之间的同步。我们提出了系统的高级设计,并讨论了在这样一个系统中需要解决的几个潜在挑战。
{"title":"The case for semantic aware remote replication","authors":"Xiaotao Liu, Gal Niv, P. Shenoy, Kadangode K. Ramakrishnan, J. Merwe","doi":"10.1145/1179559.1179575","DOIUrl":"https://doi.org/10.1145/1179559.1179575","url":null,"abstract":"This paper argues that the network latency due to synchronous replication is no longer tolerable in scenarios where businesses are required by regulation to separate their secondary sites from the primary by hundreds of miles. We propose a semantic-aware remote replication system to meet the contrasting needs of both system efficiency and safe remote replication with tight recovery-point and recovery-time objectives. Using experiments conducted on a commercial replication system and on a Linux file system we show that (i) unlike synchronous replication, asynchronous replication is relatively insensitive to network latency, and (ii) applications such as databases already intelligently deal with the weak persistency semantics offered by modern file systems. Our proposed system attempts to use asynchronous replication whenever possible and uses application/file-system \"signals\" to maintain synchrony between the primary and secondary sites. We present a high-level design of our system and discuss several potential challenges that need to be addressed in such a system.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133500797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using free web storage for data backup 使用免费的网络存储进行数据备份
Pub Date : 2006-10-30 DOI: 10.1145/1179559.1179574
Avishay Traeger, N. Joukov, J. Sipek, E. Zadok
Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to equipment. Users and businesses have important information that is difficult to replace, such as financial records and contacts. Reliable backups are crucial because some data cannot be replaced, while recreating other data can be expensive in terms of time and money. We propose two methods which leverage various types of free Web storage to provide simple, reliable, and free backup solutions.The first method is based on the storage of data in the caches of Internet search engines. We have developed CrawlBackup, a tool which prepares and provides the data for Web crawlers and can then restore the data from the Internet even if all the data on the original computer is unavailable. The second method, called MailBackup, stores redundant copies of the important data in the mailboxes of Internet mail services. We have successfully used these backup systems since the middle of 2005. In this paper we discuss and compare these methods, their feasibility of deployment, their security, and their flexibility.
备份重要数据至关重要。各种原因都可能导致数据丢失,例如磁盘故障、管理错误、病毒渗透、盗窃和设备的物理损坏。用户和企业拥有难以替代的重要信息,例如财务记录和联系人。可靠的备份至关重要,因为有些数据无法替换,而重新创建其他数据在时间和金钱上都很昂贵。我们提出了两种方法,利用各种类型的免费Web存储来提供简单、可靠和免费的备份解决方案。第一种方法是将数据存储在互联网搜索引擎的缓存中。我们开发了CrawlBackup,这是一个为网络爬虫准备和提供数据的工具,即使原始计算机上的所有数据都不可用,它也可以从互联网上恢复数据。第二种方法称为MailBackup,它将重要数据的冗余副本存储在互联网邮件服务的邮箱中。自2005年中期以来,我们已经成功地使用了这些备份系统。本文对这些方法的部署可行性、安全性和灵活性进行了讨论和比较。
{"title":"Using free web storage for data backup","authors":"Avishay Traeger, N. Joukov, J. Sipek, E. Zadok","doi":"10.1145/1179559.1179574","DOIUrl":"https://doi.org/10.1145/1179559.1179574","url":null,"abstract":"Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to equipment. Users and businesses have important information that is difficult to replace, such as financial records and contacts. Reliable backups are crucial because some data cannot be replaced, while recreating other data can be expensive in terms of time and money. We propose two methods which leverage various types of free Web storage to provide simple, reliable, and free backup solutions.The first method is based on the storage of data in the caches of Internet search engines. We have developed CrawlBackup, a tool which prepares and provides the data for Web crawlers and can then restore the data from the Internet even if all the data on the original computer is unavailable. The second method, called MailBackup, stores redundant copies of the important data in the mailboxes of Internet mail services. We have successfully used these backup systems since the middle of 2005. In this paper we discuss and compare these methods, their feasibility of deployment, their security, and their flexibility.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122679314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Secure deletion myths, issues, and solutions 安全删除神话、问题和解决方案
Pub Date : 2006-10-30 DOI: 10.1145/1179559.1179571
N. Joukov, Harry Papaxenopoulos, E. Zadok
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwriting tools work well, and that securely deleted files must be overwritten many times. (2) We discuss new and important issues that are often neglected: secure deletion consistency in case of power failures, handling versioning and journalling file systems, and metadata overwriting. (3) We present two solutions for on-demand secure deletion. First, we have created a highly portable and flexible system that performs only the minimal amount of work in kernel mode. Second, we present two in-kernel solutions in the form of Ext3 file system patches that can perform comprehensive data and metadata overwriting. We evaluated our proposed solutions and discuss the trade-offs involved.
本文有三个目标。(1)我们试图揭穿关于安全删除的几个误解:加密是每个人的理想解决方案,现有的数据覆盖工具工作良好,安全删除的文件必须被多次覆盖。(2)我们讨论了经常被忽视的新的和重要的问题:在电源故障的情况下安全删除一致性,处理版本控制和日志文件系统,以及元数据覆盖。(3)提出了两种按需安全删除的解决方案。首先,我们创建了一个高度可移植和灵活的系统,它只在内核模式下执行最少量的工作。其次,我们以Ext3文件系统补丁的形式提出了两种内核内解决方案,它们可以执行全面的数据和元数据覆盖。我们评估了我们提出的解决方案,并讨论了所涉及的权衡。
{"title":"Secure deletion myths, issues, and solutions","authors":"N. Joukov, Harry Papaxenopoulos, E. Zadok","doi":"10.1145/1179559.1179571","DOIUrl":"https://doi.org/10.1145/1179559.1179571","url":null,"abstract":"This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwriting tools work well, and that securely deleted files must be overwritten many times. (2) We discuss new and important issues that are often neglected: secure deletion consistency in case of power failures, handling versioning and journalling file systems, and metadata overwriting. (3) We present two solutions for on-demand secure deletion. First, we have created a highly portable and flexible system that performs only the minimal amount of work in kernel mode. Second, we present two in-kernel solutions in the form of Ext3 file system patches that can perform comprehensive data and metadata overwriting. We evaluated our proposed solutions and discuss the trade-offs involved.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114170088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Using device diversity to protect data against batch-correlated disk failures 使用设备多样性保护数据免受批量相关磁盘故障的影响
Pub Date : 2006-10-30 DOI: 10.1145/1179559.1179568
Jehan-Francois Pâris, D. Long
Batch-correlated failures result from the manifestation of a common defect in most, if not all, disk drives belonging to the same production batch. They are much less frequent than random disk failures but can cause catastrophic data losses even in systems that rely on mirroring or erasure codes to protect their data. We propose to reduce impact of batch-correlated failures on disk arrays by storing redundant copies of the same data on disks from different batches and, possibly, different manufacturers. The technique is especially attractive for mirrored organizations as it only requires that the two disks that hold copies of the same data never belong to the same production batch. We also show that even partial diversity can greatly increase the probability that the data stored in a RAID array will survive batch-correlated failures.
批相关故障是由于属于同一生产批的大多数(如果不是全部的话)磁盘驱动器出现共同缺陷而导致的。它们比随机磁盘故障少得多,但即使在依赖镜像或擦除码来保护数据的系统中,也可能导致灾难性的数据丢失。我们建议通过将相同数据的冗余副本存储在不同批次(可能是不同制造商)的磁盘上,来减少批相关故障对磁盘阵列的影响。该技术对镜像组织特别有吸引力,因为它只要求保存相同数据副本的两个磁盘永远不属于相同的生产批处理。我们还表明,即使部分分集也可以大大增加存储在RAID阵列中的数据在批处理相关故障中存活的概率。
{"title":"Using device diversity to protect data against batch-correlated disk failures","authors":"Jehan-Francois Pâris, D. Long","doi":"10.1145/1179559.1179568","DOIUrl":"https://doi.org/10.1145/1179559.1179568","url":null,"abstract":"Batch-correlated failures result from the manifestation of a common defect in most, if not all, disk drives belonging to the same production batch. They are much less frequent than random disk failures but can cause catastrophic data losses even in systems that rely on mirroring or erasure codes to protect their data. We propose to reduce impact of batch-correlated failures on disk arrays by storing redundant copies of the same data on disks from different batches and, possibly, different manufacturers. The technique is especially attractive for mirrored organizations as it only requires that the two disks that hold copies of the same data never belong to the same production batch. We also show that even partial diversity can greatly increase the probability that the data stored in a RAID array will survive batch-correlated failures.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115840545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
ACM International Workshop on Storage Security And Survivability
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1