Modern storage systems are responsible for increasing amounts of data and the value of the data itself is growing in importance. Several primary storage system solutions have emerged for the protection of data: (1) Secure Storage through Cryptography, (2) Backup and Versioning Systems, (3) Immutable and Tamper-Proof Storage, and (4) Redundant Storage. Using results from published studies, we compare these four solutions against different requirements highlighting trade-offs in performance, space, attack resistance, and cost. We also present a case study of applying these solutions based on design work at NCSA. Lastly, we conclude that while different storage protection solutions may be appropriate for different requirements, some general co...
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting st...
The growing number of storage security breaches as well as the need to adhere to government regulati...
As computers become pervasive in environments that include the home and community, new applications ...
There are a variety of ways to ensure the security of data and the integrity of data transfer, depen...
This article addresses the critical issue of securing backup storage for confidential data, a key co...
Aim: With the widespread adoption of disk encryption technologies, it has become common for adversar...
The costs of data loss and unavailability can be large, so businesses use many data protection techn...
This paper presents SafeStore, a distributed storage system designed to maintain long-term data dura...
This work proposes a novel design for secure cloud storage systems using a third party to meet three...
Digital information has rapidly become an important part of everyday human life. Consequently, backu...
Survivable storage system design has become a popular research topic. This paper tackles the diÆcult...
Self-securing storage prevents intruders from unde-tectably tampering with or permanently deleting s...
Self-securing storage prevents intruders from unde-tectably tampering with or permanently deleting s...
ABSTRACT Data integrity is a fundamental aspect of storage security and re-liability. With the adven...
This paper addresses the major challenges that large organizations face in protecting their valuable...
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting st...
The growing number of storage security breaches as well as the need to adhere to government regulati...
As computers become pervasive in environments that include the home and community, new applications ...
There are a variety of ways to ensure the security of data and the integrity of data transfer, depen...
This article addresses the critical issue of securing backup storage for confidential data, a key co...
Aim: With the widespread adoption of disk encryption technologies, it has become common for adversar...
The costs of data loss and unavailability can be large, so businesses use many data protection techn...
This paper presents SafeStore, a distributed storage system designed to maintain long-term data dura...
This work proposes a novel design for secure cloud storage systems using a third party to meet three...
Digital information has rapidly become an important part of everyday human life. Consequently, backu...
Survivable storage system design has become a popular research topic. This paper tackles the diÆcult...
Self-securing storage prevents intruders from unde-tectably tampering with or permanently deleting s...
Self-securing storage prevents intruders from unde-tectably tampering with or permanently deleting s...
ABSTRACT Data integrity is a fundamental aspect of storage security and re-liability. With the adven...
This paper addresses the major challenges that large organizations face in protecting their valuable...
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting st...
The growing number of storage security breaches as well as the need to adhere to government regulati...
As computers become pervasive in environments that include the home and community, new applications ...