Loading...
Please wait, while we are loading the content...
Similar Documents
Design and Implementation of a Self-Securing Storage Device (2000)
| Content Provider | CiteSeerX |
|---|---|
| Author | Strunk, John D. Goodson, Garth R. Soules, Craig A. N. Ganger, Gregory R. Scheinholtz, Michael L. |
| Abstract | Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep all versions of all data for a window of time, regardless of the commands received from potentially compromised host operating systems. Within the window, system administrators are guaranteed to have this valuable information for intrusion diagnosis and recovery. The S4 implementation combines log-structuring with novel metadata journaling and data replication techniques to minimize the performance costs of comprehensive versioning. Experiments show that self-securing storage devices can deliver performance that is comparable with conventional storage. Further, analyses indicate that several weeks worth of all versions can reasonably be kept on state-of-the-art disks, especially when dierencing and compression technologies are employed. |
| File Format | |
| Publisher Date | 2000-01-01 |
| Access Restriction | Open |
| Subject Keyword | Data Replication Technique Compression Technology Conventional Storage Intrusion Diagnosis Performance Cost Self-securing Storage Prevents Intruder Valuable Information Comprehensive Versioning System Administrator State-of-the-art Disk Novel Metadata Journaling S4 Implementation Combine Self-securing Storage Device Several Week |
| Content Type | Text |