In typical file systems, valuable data is vulnerable to being accidentally or maliciously deleted or overwritten. Versioning file systems protect data from accidents by transparently retaining old versions, but do less well in protecting data from malicious attack. These systems remain vulnerable to attackers who gain unauthorized access to prune old file versions, who bypass the file system to directly manipulate storage, or who exploit bugs in any part of the operating system. This paper presents VDisk, a secure, block-level versioning system that adds file-grain versioning to a standard, unmodified file system. VDisk consists of a set of untrusted user-mode tools and a trusted, secure kernel that is implemented within an isolated Xen vir...
A comprehensive versioning file system creates and retains a new file version for every WRITE or oth...
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting st...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
Information is capital; disk space is a mere commodity. Versioning file systems offer an appealing s...
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting st...
We present algorithms and an architecture for the secure deletion of individual versions of a file. ...
Versioning file systems are useful in applications like post-intrusion file system analysis, or reli...
AbstractThe file system becomes the usual target of malicious attacks because it contains lots of se...
Version control systems are widely used in software development and document management. Unfortunate...
We consider the problem of malicious modification of digital objects. We present a protection mechan...
Self-securing storage prevents intruders from unde-tectably tampering with or permanently deleting s...
Self-securing storage prevents intruders from unde-tectably tampering with or permanently deleting s...
Abstract- Security is an evolving domain of computer security, network security, cloud security and,...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
Desktop and mobile computing devices increasingly store critical data, both personal and professiona...
A comprehensive versioning file system creates and retains a new file version for every WRITE or oth...
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting st...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
Information is capital; disk space is a mere commodity. Versioning file systems offer an appealing s...
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting st...
We present algorithms and an architecture for the secure deletion of individual versions of a file. ...
Versioning file systems are useful in applications like post-intrusion file system analysis, or reli...
AbstractThe file system becomes the usual target of malicious attacks because it contains lots of se...
Version control systems are widely used in software development and document management. Unfortunate...
We consider the problem of malicious modification of digital objects. We present a protection mechan...
Self-securing storage prevents intruders from unde-tectably tampering with or permanently deleting s...
Self-securing storage prevents intruders from unde-tectably tampering with or permanently deleting s...
Abstract- Security is an evolving domain of computer security, network security, cloud security and,...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
Desktop and mobile computing devices increasingly store critical data, both personal and professiona...
A comprehensive versioning file system creates and retains a new file version for every WRITE or oth...
Self-securing storage prevents intruders from undetectably tampering with or permanently deleting st...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...