Protecting Data Integrity with Storage Leases
نویسندگان
چکیده
We present a storage primitive called a storage lease. Data stored under a lease cannot be written for a pre-determined period. During the lease period, online data is protected from corruption due to security breaches, software errors, or accidental data deletion. Storage leases fill an important gap in the spectrum of data protection options because they combine strong integrity for online data with the ability to eventually reclaim storage. We define the storage lease primitive, show how it can be implemented in storage device firmware, and discuss its applications. A simulation-based evaluation indicates that storage leases have a modest performance cost for most workloads on magnetic disks. Using a small amount of flash memory, this overhead can be reduced to near zero.
منابع مشابه
Remote Data Integrity Protection Enhancement in Cloud Storage
Cloud computing is the delivery of computing services over the Internet. Protecting all users’ data in the cloud is highly challenging. Since all our data stored in third party’s computer, security concerns arise. The main focus in cloud storage is data security and integrity. This paper works on securing cloud data from corruptions, checking for its integrity and recovering data during failure...
متن کاملEmc Cloudarray Best Practices: Cloud Storage Security and Data Integrity
This white paper outlines how EMC CloudArray uses best practices for protecting data in the cloud from unauthorized access and maintaining data integrity. By using these guidelines as a basis, you can make data storage in the cloud as secure or, surprisingly, even more secure than local storage.
متن کاملA Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems
To date, the cloud storage system has been well developed. It is a system that provides users with large storage, high computation ability, and convenience. However, users cannot fully trust a cloud storage system because it is an “honest but curious”server. For this reason, protecting data confidentiality and data integrity are two important issues in a cloud storage system. In this paper, we ...
متن کاملChapter 5.1 – Protecting Data in Outsourcing Scenarios
Goal of this chapter is to describe the main solutions being devised for protecting data confidentiality and integrity in outsourcing scenarios. In particular, we illustrate approaches that guarantee data confidentiality by applying encryption or a combination of encryption and fragmentation. We then focus on approaches that aim at guaranteeing data integrity in storage and in query computation...
متن کاملProtecting multimedia data in storage: a survey of techniques emphasizing encryption
Protecting multimedia data from malicious computer users continues to grow in importance. Whether preventing unauthorized access to digital photographs, ensuring compliance with copyright regulations, or guaranteeing the integrity of a video teleconference, all multimedia applications require increased security in the presence of talented intruders. Specifically, as more and more files are pres...
متن کامل