首页 > 最新文献

ACM International Workshop on Storage Security And Survivability最新文献

英文 中文
Secure capabilities for a petabyte-scale object-based distributed file system 用于pb级基于对象的分布式文件系统的安全功能
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103791
Christopher Olson, E. L. Miller
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed for NASD assumes that each client will contact the server to get a capability to access one object on a server. While this approach works well in smaller-scale systems in which each file is composed of a few objects, it fails for large-scale systems in which thousands of clients make accesses to a single file composed of thousands of objects spread across thousands of disks. The file system we are building, Ceph, distributes files across many objects and disks to distribute load and improve reliability. In such a system, the metadata server cluster will sometimes see thousands of open requests for the same file within seconds. To address this bottleneck, we propose new authentication protocols for object-based storage systems in which a sequence of fixed-size objects comprise a file and flash crowds are likely. We qualitatively evaluated the security and risks of each protocol, and, using traces of a scientific application, compared the overhead of each protocol. We found that, surprisingly, a protocol using public key cryptography incurred little extra cost while providing greater security than a protocol using only symmetric key cryptography.
近年来,网络附加安全磁盘(NASD)模型已成为构建大型存储系统的一种广泛使用的技术。然而,为NASD提出的安全系统假设每个客户机都将与服务器联系,以获得访问服务器上一个对象的能力。虽然这种方法在每个文件由几个对象组成的较小规模系统中工作得很好,但对于数千个客户机访问由分布在数千个磁盘上的数千个对象组成的单个文件的大型系统来说,它就失败了。我们正在构建的文件系统Ceph将文件分布到许多对象和磁盘上,以分配负载并提高可靠性。在这样的系统中,元数据服务器集群有时会在几秒钟内看到数千个对同一文件的打开请求。为了解决这一瓶颈,我们为基于对象的存储系统提出了新的身份验证协议,其中固定大小的对象序列包含文件和闪存群。我们定性地评估了每个协议的安全性和风险,并使用科学应用程序的痕迹,比较了每个协议的开销。我们发现,令人惊讶的是,使用公钥加密的协议在提供比仅使用对称密钥加密的协议更高的安全性的同时,几乎不会产生额外的成本。
{"title":"Secure capabilities for a petabyte-scale object-based distributed file system","authors":"Christopher Olson, E. L. Miller","doi":"10.1145/1103780.1103791","DOIUrl":"https://doi.org/10.1145/1103780.1103791","url":null,"abstract":"Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed for NASD assumes that each client will contact the server to get a capability to access one object on a server. While this approach works well in smaller-scale systems in which each file is composed of a few objects, it fails for large-scale systems in which thousands of clients make accesses to a single file composed of thousands of objects spread across thousands of disks. The file system we are building, Ceph, distributes files across many objects and disks to distribute load and improve reliability. In such a system, the metadata server cluster will sometimes see thousands of open requests for the same file within seconds. To address this bottleneck, we propose new authentication protocols for object-based storage systems in which a sequence of fixed-size objects comprise a file and flash crowds are likely. We qualitatively evaluated the security and risks of each protocol, and, using traces of a scientific application, compared the overhead of each protocol. We found that, surprisingly, a protocol using public key cryptography incurred little extra cost while providing greater security than a protocol using only symmetric key cryptography.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130350105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Expecting the unexpected: adaptation for predictive energy conservation 期待意外:适应预测性节能
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103800
Jeffrey P. Rybczynski, D. Long, A. Amer
The use of access predictors to improve storage device performance has been investigated for both improving access times, as well as a means of reducing energy consumed by the disk. Such predictors also offer us an opportunity to demonstrate the benefits of an adaptive approach to handling unexpected workloads, whether they are the result of natural variation or deliberate attempts to generate a problematic workload. Such workloads can pose a threat to system availability if they result in the excessive consumption of potentially limited resources such as energy. We propose that actively reshaping a disk access workload, using a dynamically self-adjusting access predictor, allows for consistently good performance in the face of varying workloads. Specifically, we describe how our Best Shifting prefetching policy, by adapting to the needs of the currently observed workload, can use 15% to 35% less energy than traditional disk spin-down strategies and 5% to 10% less energy than the use of a fixed prefetching policy.
使用访问预测器来提高存储设备性能的研究包括改进访问时间,以及减少磁盘消耗的能量。这样的预测器还为我们提供了一个机会来展示处理意外工作负载的自适应方法的好处,无论它们是自然变化的结果,还是故意尝试生成有问题的工作负载。如果这些工作负载导致过度消耗可能有限的资源(如能源),则可能对系统可用性构成威胁。我们建议使用动态自调整访问预测器积极地重塑磁盘访问工作负载,从而在面对不同的工作负载时实现始终如一的良好性能。具体来说,我们描述了我们的最佳移位预取策略如何通过适应当前观察到的工作负载的需求,比传统的磁盘休眠策略节省15%到35%的能量,比使用固定预取策略节省5%到10%的能量。
{"title":"Expecting the unexpected: adaptation for predictive energy conservation","authors":"Jeffrey P. Rybczynski, D. Long, A. Amer","doi":"10.1145/1103780.1103800","DOIUrl":"https://doi.org/10.1145/1103780.1103800","url":null,"abstract":"The use of access predictors to improve storage device performance has been investigated for both improving access times, as well as a means of reducing energy consumed by the disk. Such predictors also offer us an opportunity to demonstrate the benefits of an adaptive approach to handling unexpected workloads, whether they are the result of natural variation or deliberate attempts to generate a problematic workload. Such workloads can pose a threat to system availability if they result in the excessive consumption of potentially limited resources such as energy. We propose that actively reshaping a disk access workload, using a dynamically self-adjusting access predictor, allows for consistently good performance in the face of varying workloads. Specifically, we describe how our Best Shifting prefetching policy, by adapting to the needs of the currently observed workload, can use 15% to 35% less energy than traditional disk spin-down strategies and 5% to 10% less energy than the use of a fixed prefetching policy.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"23 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121090300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Storage-based file system integrity checker 基于存储的文件系统完整性检查器
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103789
M. Banikazemi, D. Poff, B. Abali
In this paper we present a storage based intrusion detection system (IDS) which uses time and space efficient point-in-time copy and performs file system integrity checks to detect intrusions. The storage system software is enhanced to keep track of modified blocks such that the file system scan can be performed more efficiently. Furthermore, when an intrusion occurs a recent undamaged copy of the storage is used to recover the compromised data.
本文提出了一种基于存储的入侵检测系统(IDS),该系统利用时间和空间有效的时间点复制和文件系统完整性检查来检测入侵。存储系统软件增强了跟踪修改块的功能,从而可以更有效地执行文件系统扫描。此外,当入侵发生时,使用最近未损坏的存储副本来恢复受损的数据。
{"title":"Storage-based file system integrity checker","authors":"M. Banikazemi, D. Poff, B. Abali","doi":"10.1145/1103780.1103789","DOIUrl":"https://doi.org/10.1145/1103780.1103789","url":null,"abstract":"In this paper we present a storage based intrusion detection system (IDS) which uses time and space efficient point-in-time copy and performs file system integrity checks to detect intrusions. The storage system software is enhanced to keep track of modified blocks such that the file system scan can be performed more efficiently. Furthermore, when an intrusion occurs a recent undamaged copy of the storage is used to recover the compromised data.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131950543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Toward a threat model for storage systems 建立存储系统的威胁模型
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103795
Ragib Hasan, Suvda Myagmar, Adam J. Lee, W. Yurcik
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the lack of a comprehensive process to designing storage protection solutions. Designing protection for storage systems is best done by utilizing proactive system engineering rather than reacting with ad hoc countermeasures to the latest attack du jour. The purpose of threat modeling is to organize system threats and vulnerabilities into general classes to be addressed with known storage protection techniques. Although there has been prior work on threat modeling primarily for software applications, to our knowledge this is the first attempt at domain-specific threat modeling for storage systems. We discuss protection challenges unique to storage systems and propose two different processes to creating a threat model for storage systems: one based on classical security principles Confidentiality, Integrity, Availability, Authentication, or CIAA) and another based on the Data Lifecycle Model. It is our hope that this initial work will start a discussion on how to better design and implement storage protection solutions against storage threats.
越来越多的存储安全漏洞以及遵守政府法规的需求推动了对更大存储保护的需求。然而,缺乏一个全面的过程来设计存储保护解决方案。对存储系统的保护设计最好是利用主动的系统工程,而不是对最新的攻击做出临时的反应。威胁建模的目的是将系统威胁和漏洞组织到通用类中,以便使用已知的存储保护技术进行处理。虽然之前有针对软件应用程序的威胁建模的工作,但据我们所知,这是针对存储系统的特定领域威胁建模的第一次尝试。我们讨论了存储系统特有的保护挑战,并提出了为存储系统创建威胁模型的两种不同流程:一种基于经典安全原则机密性、完整性、可用性、身份验证或CIAA),另一种基于数据生命周期模型。我们希望这一初步工作将引发关于如何更好地设计和实施存储保护解决方案以应对存储威胁的讨论。
{"title":"Toward a threat model for storage systems","authors":"Ragib Hasan, Suvda Myagmar, Adam J. Lee, W. Yurcik","doi":"10.1145/1103780.1103795","DOIUrl":"https://doi.org/10.1145/1103780.1103795","url":null,"abstract":"The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the lack of a comprehensive process to designing storage protection solutions. Designing protection for storage systems is best done by utilizing proactive system engineering rather than reacting with ad hoc countermeasures to the latest attack du jour. The purpose of threat modeling is to organize system threats and vulnerabilities into general classes to be addressed with known storage protection techniques. Although there has been prior work on threat modeling primarily for software applications, to our knowledge this is the first attempt at domain-specific threat modeling for storage systems. We discuss protection challenges unique to storage systems and propose two different processes to creating a threat model for storage systems: one based on classical security principles Confidentiality, Integrity, Availability, Authentication, or CIAA) and another based on the Data Lifecycle Model. It is our hope that this initial work will start a discussion on how to better design and implement storage protection solutions against storage threats.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127703826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Securing distributed storage: challenges, techniques, and systems 保护分布式存储:挑战、技术和系统
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103783
Vishal Kher, Yongdae Kim
The rapid increase of sensitive data and the growing number of government regulations that require longterm data retention and protection have forced enterprises to pay serious attention to storage security. In this paper, we discuss important security issues related to storage and present a comprehensive survey of the security services provided by the existing storage systems. We cover a broad range of the storage security literature, present a critical review of the existing solutions, compare them, and highlight potential research issues.
随着敏感数据的快速增长,以及越来越多需要长期保存和保护数据的政府法规的出台,迫使企业开始重视存储安全问题。在本文中,我们讨论了与存储相关的重要安全问题,并对现有存储系统提供的安全服务进行了全面调查。我们涵盖了广泛的存储安全文献,对现有解决方案进行了批判性的回顾,比较了它们,并强调了潜在的研究问题。
{"title":"Securing distributed storage: challenges, techniques, and systems","authors":"Vishal Kher, Yongdae Kim","doi":"10.1145/1103780.1103783","DOIUrl":"https://doi.org/10.1145/1103780.1103783","url":null,"abstract":"The rapid increase of sensitive data and the growing number of government regulations that require longterm data retention and protection have forced enterprises to pay serious attention to storage security. In this paper, we discuss important security issues related to storage and present a comprehensive survey of the security services provided by the existing storage systems. We cover a broad range of the storage security literature, present a critical review of the existing solutions, compare them, and highlight potential research issues.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122189841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 131
Toward securing untrusted storage without public-key operations 在没有公钥操作的情况下保护不受信任的存储
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103788
D. Naor, Amir Shenhav, A. Wool
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, widely used in such file systems, are known to have worse performance than their symmetric key counterparts. In this paper we examine design alternatives that avoid public-key cryptography operations to achieve better performance. We present the trade-offs and limitations that are introduced by these substitutions.
向共享、远程和不受信任的存储文件系统添加安全功能会导致性能下降,从而限制了它们的使用。众所周知,在这类文件系统中广泛使用的公钥加密原语的性能比对称密钥对应的性能差。在本文中,我们研究了避免公钥加密操作以获得更好性能的设计替代方案。我们介绍了这些替换所带来的权衡和限制。
{"title":"Toward securing untrusted storage without public-key operations","authors":"D. Naor, Amir Shenhav, A. Wool","doi":"10.1145/1103780.1103788","DOIUrl":"https://doi.org/10.1145/1103780.1103788","url":null,"abstract":"Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, widely used in such file systems, are known to have worse performance than their symmetric key counterparts. In this paper we examine design alternatives that avoid public-key cryptography operations to achieve better performance. We present the trade-offs and limitations that are introduced by these substitutions.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"43 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Security of erasable memories against adaptive adversaries 可擦除记忆抵御适应性对手的安全性
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103798
G. D. Crescenzo
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We continue the investigation started in [3] by presenting an enhanced privacy notion that captures practical scenarios of adversaries repeatedly and adaptively attacking the memory to inspect its entire content before trying to obtain information about deleted data. We prove that the new notion is strictly stronger than the previous one considered in [3] (allowing the adversary a single intrusion), and show then that the efficient protocol in [3] still satisfies the new notion. One question implicitly raised by the previous work was whether it is indeed possible to define one meaningful and applicable notion of security even against adversaries that can repeatedly and adaptively obtain total control of the memory. Perhaps unexpectedly, our paper affirmatively answers this question.
我们研究了加密建模和基于加密的设计技术,以保证数据的隐私,这些数据首先存储在某种类型的计算机内存中,然后被删除。我们继续b[3]中开始的调查,提出了一种增强的隐私概念,该概念捕获了攻击者反复自适应攻击内存的实际场景,以便在试图获取有关已删除数据的信息之前检查其整个内容。我们证明了新概念比[3]中考虑的旧概念严格强(允许对手进行一次入侵),并证明了[3]中的高效协议仍然满足新概念。先前的工作隐含地提出了一个问题,即是否确实有可能定义一个有意义和适用的安全概念,即使是针对可以反复和自适应地获得对内存的完全控制的对手。也许出乎意料的是,我们的论文肯定地回答了这个问题。
{"title":"Security of erasable memories against adaptive adversaries","authors":"G. D. Crescenzo","doi":"10.1145/1103780.1103798","DOIUrl":"https://doi.org/10.1145/1103780.1103798","url":null,"abstract":"We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We continue the investigation started in [3] by presenting an enhanced privacy notion that captures practical scenarios of adversaries repeatedly and adaptively attacking the memory to inspect its entire content before trying to obtain information about deleted data. We prove that the new notion is strictly stronger than the previous one considered in [3] (allowing the adversary a single intrusion), and show then that the efficient protocol in [3] still satisfies the new notion. One question implicitly raised by the previous work was whether it is indeed possible to define one meaningful and applicable notion of security even against adversaries that can repeatedly and adaptively obtain total control of the memory. Perhaps unexpectedly, our paper affirmatively answers this question.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127364224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Verifiable audit trails for a versioning file system 版本控制文件系统的可验证审计跟踪
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103787
Zachary N. J. Peterson, R. Burns, G. Ateniese, Stephen Bono
We present constructs that create, manage, and verify digital audit trails for versioning file systems. Based upon a small amount of data published to a third party, a file system commits to a version history. At a later date, an auditor uses the published data to verify the contents of the file system at any point in time. Audit trails create an analog of the paper audit process for file data, helping to meet the requirements of electronic record legislation, such as Sarbanes-Oxley. Our techniques address the I/O and computational efficiency of generating and verifying audit trails, the aggregation of audit information in directory hierarchies, and constructing verifiable audit trails in the presence of lost data.
我们介绍了用于创建、管理和验证文件系统版本化的数字审计跟踪的构造。文件系统根据向第三方发布的少量数据提交版本历史记录。在以后的日期,审计人员使用发布的数据来验证文件系统在任何时间点的内容。审计跟踪为文件数据创建了纸质审计过程的模拟,有助于满足电子记录立法的要求,例如Sarbanes-Oxley。我们的技术解决了生成和验证审计跟踪的I/O和计算效率、目录层次结构中审计信息的聚合,以及在存在丢失数据的情况下构造可验证的审计跟踪。
{"title":"Verifiable audit trails for a versioning file system","authors":"Zachary N. J. Peterson, R. Burns, G. Ateniese, Stephen Bono","doi":"10.1145/1103780.1103787","DOIUrl":"https://doi.org/10.1145/1103780.1103787","url":null,"abstract":"We present constructs that create, manage, and verify digital audit trails for versioning file systems. Based upon a small amount of data published to a third party, a file system commits to a version history. At a later date, an auditor uses the published data to verify the contents of the file system at any point in time. Audit trails create an analog of the paper audit process for file data, helping to meet the requirements of electronic record legislation, such as Sarbanes-Oxley. Our techniques address the I/O and computational efficiency of generating and verifying audit trails, the aggregation of audit information in directory hierarchies, and constructing verifiable audit trails in the presence of lost data.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115250073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Ensuring data integrity in storage: techniques and applications 确保存储中的数据完整性:技术和应用
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103784
Gopalan Sivathanu, Charles P. Wright, E. Zadok
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for storage, interesting challenges arise in ensuring data integrity. In this paper, we discuss the causes of integrity violations in storage and present a survey of integrity assurance techniques that exist today. We describe several interesting applications of storage integrity checking, apart from security, and discuss the implementation issues associated with techniques. Based on our analysis, we discuss the choices and trade-offs associated with each mechanism. We then identify and formalize a new class of integrity assurance techniques that involve logical redundancy. We describe how logical redundancy can be used in today's systems to perform efficient and seamless integrity assurance.
数据完整性是存储安全性和可靠性的一个基本方面。随着网络存储的出现和新技术趋势导致存储出现新的故障模式,在确保数据完整性方面出现了有趣的挑战。在本文中,我们讨论了存储中完整性违反的原因,并介绍了目前存在的完整性保证技术的调查。除了安全性之外,我们还描述了存储完整性检查的几个有趣的应用,并讨论了与技术相关的实现问题。根据我们的分析,我们将讨论与每种机制相关的选择和权衡。然后,我们确定并形式化了一类涉及逻辑冗余的新的完整性保证技术。我们描述了如何在当今的系统中使用逻辑冗余来执行高效和无缝的完整性保证。
{"title":"Ensuring data integrity in storage: techniques and applications","authors":"Gopalan Sivathanu, Charles P. Wright, E. Zadok","doi":"10.1145/1103780.1103784","DOIUrl":"https://doi.org/10.1145/1103780.1103784","url":null,"abstract":"Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for storage, interesting challenges arise in ensuring data integrity. In this paper, we discuss the causes of integrity violations in storage and present a survey of integrity assurance techniques that exist today. We describe several interesting applications of storage integrity checking, apart from security, and discuss the implementation issues associated with techniques. Based on our analysis, we discuss the choices and trade-offs associated with each mechanism. We then identify and formalize a new class of integrity assurance techniques that involve logical redundancy. We describe how logical redundancy can be used in today's systems to perform efficient and seamless integrity assurance.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128721602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 122
Pvault: a client server system providing mobile access to personal data Pvault:提供移动访问个人数据的客户端服务器系统
Pub Date : 2005-11-11 DOI: 10.1145/1103780.1103799
R. Jammalamadaka, S. Mehrotra, N. Venkatasubramanian
In this paper we describe the design for the Pvault software, which is a personal data manager that stores and retrieves data from a remote untrusted data server securely. The major advantage of Pvault is that it allows users to access their personal data from any trusted remote computer. We will describe the issues and solutions for maintaining data confidentiality and integrity when the data is stored at the remote sever, since the server itself is untrusted. Pvault also prevents Phishing and Pharming attacks and we will describe the solutions for the same.
在本文中,我们描述了Pvault软件的设计,它是一个个人数据管理器,可以安全地存储和检索来自远程不可信数据服务器的数据。Pvault的主要优点是它允许用户从任何可信的远程计算机访问他们的个人数据。当数据存储在远程服务器上时,由于服务器本身不受信任,我们将描述维护数据机密性和完整性的问题和解决方案。Pvault还可以防止网络钓鱼和钓鱼攻击,我们将描述解决方案。
{"title":"Pvault: a client server system providing mobile access to personal data","authors":"R. Jammalamadaka, S. Mehrotra, N. Venkatasubramanian","doi":"10.1145/1103780.1103799","DOIUrl":"https://doi.org/10.1145/1103780.1103799","url":null,"abstract":"In this paper we describe the design for the Pvault software, which is a personal data manager that stores and retrieves data from a remote untrusted data server securely. The major advantage of Pvault is that it allows users to access their personal data from any trusted remote computer. We will describe the issues and solutions for maintaining data confidentiality and integrity when the data is stored at the remote sever, since the server itself is untrusted. Pvault also prevents Phishing and Pharming attacks and we will describe the solutions for the same.","PeriodicalId":413919,"journal":{"name":"ACM International Workshop on Storage Security And Survivability","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128819183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
ACM International Workshop on Storage Security And Survivability
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1