Removing hard drives from a data center may expose sensitive data, such as encryption keys or passwords. To prevent exposure, data centers have security policies in place to physically secure drives in the system, and securely delete data from drives that are removed. Despite advances in security technology and best practices, implementation of these security measures is often done incorrectly. We anticipate that physical security will fail, and fixing the issue after the failure is costly and ineffective. We propose Inkpack, a protocol that prevents an attacker from reading data from a drive removed from the data center even if the attacker has the user key linked to the data. An implementation of this protocol encrypts data, and secret sp...
Information sharing is an imperative usefulness in distributed storage. In this paper, we demonstrat...
Modern workstations and servers implicitly trust hard disks to act as well-behaved block devices. Th...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
As computers become pervasive in environments that include the home and community, new applications ...
Clustered storage systems are dominant solutions for the era of data-intensive computing. Ceph repre...
This article addresses the critical issue of securing backup storage for confidential data, a key co...
Aim: With the widespread adoption of disk encryption technologies, it has become common for adversar...
In recent years, our society has seen a shift towards a reliance on digital means of data storage. T...
As distributed computing systems grow in size, complexity and variety of application, the problem of...
With the importance of data security, organizations are paying more attention on the confidentiality...
Modern storage systems are responsible for increasing amounts of data and the value of the data itse...
Cyber theft is a serious threat to Internet security. It is one of the ma-jor security concerns by b...
Information leakage has recently become a serious problem. Because a user's disk might contain a lot...
Abstract- Nowadays, the rates of malicious data theft and data destruction are alarming. Governments...
Advancements in attacks with physical access to commodity hardware has resulted in a general consens...
Information sharing is an imperative usefulness in distributed storage. In this paper, we demonstrat...
Modern workstations and servers implicitly trust hard disks to act as well-behaved block devices. Th...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
As computers become pervasive in environments that include the home and community, new applications ...
Clustered storage systems are dominant solutions for the era of data-intensive computing. Ceph repre...
This article addresses the critical issue of securing backup storage for confidential data, a key co...
Aim: With the widespread adoption of disk encryption technologies, it has become common for adversar...
In recent years, our society has seen a shift towards a reliance on digital means of data storage. T...
As distributed computing systems grow in size, complexity and variety of application, the problem of...
With the importance of data security, organizations are paying more attention on the confidentiality...
Modern storage systems are responsible for increasing amounts of data and the value of the data itse...
Cyber theft is a serious threat to Internet security. It is one of the ma-jor security concerns by b...
Information leakage has recently become a serious problem. Because a user's disk might contain a lot...
Abstract- Nowadays, the rates of malicious data theft and data destruction are alarming. Governments...
Advancements in attacks with physical access to commodity hardware has resulted in a general consens...
Information sharing is an imperative usefulness in distributed storage. In this paper, we demonstrat...
Modern workstations and servers implicitly trust hard disks to act as well-behaved block devices. Th...
Modern computer systems have critical security problems because of two wrong assumptions security sy...