Loading...
Please wait, while we are loading the content...
Similar Documents
Configurable security for scavenged storage systems
Content Provider | ACM Digital Library |
---|---|
Author | Gharaibeh, Abdullah Al-Kiswany, Samer Ripeanu, Matei |
Abstract | Scavenged storage systems harness unused disk space from individual workstations the same way idle CPU cycles are harnessed by desktop grid applications like Seti@Home. These systems provide a promising low cost, high-performance storage solution in certain high-end computing scenarios. However, selecting the security level and designing the security mechanisms for such systems is challenging as scavenging idle storage opens the door for security threats absent in traditional storage systems that use dedicated nodes under a single administrative domain. Moreover, increased security often comes at the price of performance and scalability. This paper develops a general threat model for systems that use scavenged storage, presents the design of a protocol that addresses these threats and is optimized for throughput, and evaluates the overheads brought by the new security protocol when configured to provide a number of different security properties. |
Starting Page | 55 |
Ending Page | 62 |
Page Count | 8 |
File Format | |
ISBN | 9781605582993 |
DOI | 10.1145/1456469.1456480 |
Language | English |
Publisher | Association for Computing Machinery (ACM) |
Publisher Date | 2008-10-31 |
Publisher Place | New York |
Access Restriction | Subscribed |
Subject Keyword | Performance evaluation Secure storage systems |
Content Type | Text |
Resource Type | Article |