Design and implementation of a self-securing storage device
نویسندگان
چکیده
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep all versions of all data for a window of time, regardless of the commands received from potentially compromised host operating systems. Within the window, system administrators are guaranteed to have this valuable information for intrusion diagnosis and recovery. The S4 implementation combines log-structuring with novel metadata journaling and data replication techniques to minimize the performance costs of comprehensive versioning. Experiments show that self-securing storage devices can deliver performance that is comparable with conventional storage. Further, analyses indicate that several weeks worth of all versions can reasonably be kept on state-of-the-art disks, especially when differencing and compression technologies are employed. The authors would like to thank the member companies of the Parallel Data Consortium (CLARiiON Array Development, EMC Corporation, Hewlett-Packard Labs, Hitachi, Infineon Technologies, Intel Corporation, LSI Logic, MTI Technology Corporation, Novell, Inc., PANASAS, L.L.C., Procom Technology, Quantum Corporation, Seagate Technology, Sun Microsystems, Veritas Software Corporation, and 3Com Corporation). The authors also thank IBM Corporation and CMU's Data Storage Systems Center for their support of this project.
منابع مشابه
Design and Implementation of a Self-Securing Storage Device (CMU-CS-00-129)
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep all versions of all data for a window of time, regardless of the commands received from potentially compromised host operating systems. Within the window, system administrators are guaranteed to ha...
متن کاملSelf-Securing Storage: Protecting Data in Compromised Systems
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep old versions of data for a window of time, regardless of the commands received from potentially compromised host operating systems. Within the window, system administrators have this valuable infor...
متن کاملArchitecture and Interface of a Self-Securing Object Store
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep all versions of all data for a window of time, regardless of the commands received from potentially compromised host operating systems. Within this window, system administrators have valuable infor...
متن کاملDesign and Implementation of an Automated Dispensing Device for Reducing Methadone Therapy Misuse
Introduction: A variety of (deliberate or inaccurate) errors in drug rehabilitation clinics may occur due to use of addictive drugs. Automated drug distribution systems play a significant role in reducing drug medication errors. Method: Firstly, according to the addiction rehabilitation centers requests, the design and construction of the device was performed. The prototype systems were examin...
متن کاملAn Efficient Versioning File System for Self-Securing Storage
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. By keeping all versions of all data for a window of time and separating the storage system from the host operating system, self securing storage can protect its data from corruption. This paper describes a versioning file system that combines log-structuring with novel metadata journal...
متن کامل