Protecting Data Integrity with Storage Leases

نویسندگان

  • Anjo Vahldiek
  • Eslam Elnikety
  • Ansley Post
  • Peter Druschel
  • Rodrigo Rodrigues
چکیده

We present a storage primitive called a storage lease. Data stored under a lease cannot be written for a pre-determined period. During the lease period, online data is protected from corruption due to security breaches, software errors, or accidental data deletion. Storage leases fill an important gap in the spectrum of data protection options because they combine strong integrity for online data with the ability to eventually reclaim storage. We define the storage lease primitive, show how it can be implemented in storage device firmware, and discuss its applications. A simulation-based evaluation indicates that storage leases have a modest performance cost for most workloads on magnetic disks. Using a small amount of flash memory, this overhead can be reduced to near zero.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Remote Data Integrity Protection Enhancement in Cloud Storage

Cloud computing is the delivery of computing services over the Internet. Protecting all users’ data in the cloud is highly challenging. Since all our data stored in third party’s computer, security concerns arise. The main focus in cloud storage is data security and integrity. This paper works on securing cloud data from corruptions, checking for its integrity and recovering data during failure...

متن کامل

Emc Cloudarray Best Practices: Cloud Storage Security and Data Integrity

This white paper outlines how EMC CloudArray uses best practices for protecting data in the cloud from unauthorized access and maintaining data integrity. By using these guidelines as a basis, you can make data storage in the cloud as secure or, surprisingly, even more secure than local storage.

متن کامل

A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems

To date, the cloud storage system has been well developed. It is a system that provides users with large storage, high computation ability, and convenience. However, users cannot fully trust a cloud storage system because it is an “honest but curious”server. For this reason, protecting data confidentiality and data integrity are two important issues in a cloud storage system. In this paper, we ...

متن کامل

Chapter 5.1 – Protecting Data in Outsourcing Scenarios

Goal of this chapter is to describe the main solutions being devised for protecting data confidentiality and integrity in outsourcing scenarios. In particular, we illustrate approaches that guarantee data confidentiality by applying encryption or a combination of encryption and fragmentation. We then focus on approaches that aim at guaranteeing data integrity in storage and in query computation...

متن کامل

Protecting multimedia data in storage: a survey of techniques emphasizing encryption

Protecting multimedia data from malicious computer users continues to grow in importance. Whether preventing unauthorized access to digital photographs, ensuring compliance with copyright regulations, or guaranteeing the integrity of a video teleconference, all multimedia applications require increased security in the presence of talented intruders. Specifically, as more and more files are pres...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013