Survivable storage systems
Survivable storage systems must maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems and user accounts. These four component types can be grouped into two classes: server-side problems and client-side problems....
Gespeichert in:
Hauptverfasser: | , , , , , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 195 vol.2 |
---|---|
container_issue | |
container_start_page | 184 |
container_title | |
container_volume | 2 |
creator | Ganger, G.R. Khosla, P.K. Bakkaloglu, M. Bigrigg, M.W. Goodson, G.R. Oguz, S. Pandurangan, V. Soules, C.A.N. Strunk, J.D. Wylie, J.J. |
description | Survivable storage systems must maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems and user accounts. These four component types can be grouped into two classes: server-side problems and client-side problems. The PASIS architecture addresses server-side problems, including the connections to those servers, by encoding data with threshold schemes and distributing trust amongst sets of storage servers. Self-securing storage addresses client and user account problems by transparently auditing accesses and versioning data within each storage server. Thus, PASIS clients use threshold schemes to protect themselves from compromised servers, and self-securing servers use full access auditing to protect their data from compromised clients. Together, these techniques can provide truly survivable storage systems. |
doi_str_mv | 10.1109/DISCEX.2001.932171 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_932171</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>932171</ieee_id><sourcerecordid>932171</sourcerecordid><originalsourceid>FETCH-LOGICAL-i174t-e2587c37ab8fedd53aff011c5ac8d124b236e5f22a6ce389cc6fe9df70a5149c3</originalsourceid><addsrcrecordid>eNotjk1rwkAQQBdKwWr9Azn1DyTuzGayu0eJHxWEHmzBm0w2syVFqWRTwX9fQd_l3R5PqQx0AaD9bLHZ1ct9gVpD4Q2ChSc11rbyBAhoR2qa0o--QeSA_IvKdn_9pbtwc5S3NPz2_H3zNQ1ySq_qOfIxyfThifpaLT_r93z7sd7U823egS2HXJCcDcZy46K0LRmOUQME4uBawLJBUwlFRK6CGOdDqKL4NlrNBKUPZqKye7cTkcO5707cXw_3e_MP1rI68Q</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Survivable storage systems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Ganger, G.R. ; Khosla, P.K. ; Bakkaloglu, M. ; Bigrigg, M.W. ; Goodson, G.R. ; Oguz, S. ; Pandurangan, V. ; Soules, C.A.N. ; Strunk, J.D. ; Wylie, J.J.</creator><creatorcontrib>Ganger, G.R. ; Khosla, P.K. ; Bakkaloglu, M. ; Bigrigg, M.W. ; Goodson, G.R. ; Oguz, S. ; Pandurangan, V. ; Soules, C.A.N. ; Strunk, J.D. ; Wylie, J.J.</creatorcontrib><description>Survivable storage systems must maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems and user accounts. These four component types can be grouped into two classes: server-side problems and client-side problems. The PASIS architecture addresses server-side problems, including the connections to those servers, by encoding data with threshold schemes and distributing trust amongst sets of storage servers. Self-securing storage addresses client and user account problems by transparently auditing accesses and versioning data within each storage server. Thus, PASIS clients use threshold schemes to protect themselves from compromised servers, and self-securing servers use full access auditing to protect their data from compromised clients. Together, these techniques can provide truly survivable storage systems.</description><identifier>ISBN: 0769512127</identifier><identifier>ISBN: 9780769512129</identifier><identifier>DOI: 10.1109/DISCEX.2001.932171</identifier><language>eng</language><publisher>IEEE</publisher><subject>Availability ; Computer architecture ; Data security ; Encoding ; Information security ; Multiprocessor interconnection networks ; Network servers ; Pervasive computing ; Protection ; Secure storage</subject><ispartof>Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2001, Vol.2, p.184-195 vol.2</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/932171$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,4036,4037,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/932171$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ganger, G.R.</creatorcontrib><creatorcontrib>Khosla, P.K.</creatorcontrib><creatorcontrib>Bakkaloglu, M.</creatorcontrib><creatorcontrib>Bigrigg, M.W.</creatorcontrib><creatorcontrib>Goodson, G.R.</creatorcontrib><creatorcontrib>Oguz, S.</creatorcontrib><creatorcontrib>Pandurangan, V.</creatorcontrib><creatorcontrib>Soules, C.A.N.</creatorcontrib><creatorcontrib>Strunk, J.D.</creatorcontrib><creatorcontrib>Wylie, J.J.</creatorcontrib><title>Survivable storage systems</title><title>Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01</title><addtitle>DISCEX</addtitle><description>Survivable storage systems must maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems and user accounts. These four component types can be grouped into two classes: server-side problems and client-side problems. The PASIS architecture addresses server-side problems, including the connections to those servers, by encoding data with threshold schemes and distributing trust amongst sets of storage servers. Self-securing storage addresses client and user account problems by transparently auditing accesses and versioning data within each storage server. Thus, PASIS clients use threshold schemes to protect themselves from compromised servers, and self-securing servers use full access auditing to protect their data from compromised clients. Together, these techniques can provide truly survivable storage systems.</description><subject>Availability</subject><subject>Computer architecture</subject><subject>Data security</subject><subject>Encoding</subject><subject>Information security</subject><subject>Multiprocessor interconnection networks</subject><subject>Network servers</subject><subject>Pervasive computing</subject><subject>Protection</subject><subject>Secure storage</subject><isbn>0769512127</isbn><isbn>9780769512129</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2001</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjk1rwkAQQBdKwWr9Azn1DyTuzGayu0eJHxWEHmzBm0w2syVFqWRTwX9fQd_l3R5PqQx0AaD9bLHZ1ct9gVpD4Q2ChSc11rbyBAhoR2qa0o--QeSA_IvKdn_9pbtwc5S3NPz2_H3zNQ1ySq_qOfIxyfThifpaLT_r93z7sd7U823egS2HXJCcDcZy46K0LRmOUQME4uBawLJBUwlFRK6CGOdDqKL4NlrNBKUPZqKye7cTkcO5707cXw_3e_MP1rI68Q</recordid><startdate>2001</startdate><enddate>2001</enddate><creator>Ganger, G.R.</creator><creator>Khosla, P.K.</creator><creator>Bakkaloglu, M.</creator><creator>Bigrigg, M.W.</creator><creator>Goodson, G.R.</creator><creator>Oguz, S.</creator><creator>Pandurangan, V.</creator><creator>Soules, C.A.N.</creator><creator>Strunk, J.D.</creator><creator>Wylie, J.J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2001</creationdate><title>Survivable storage systems</title><author>Ganger, G.R. ; Khosla, P.K. ; Bakkaloglu, M. ; Bigrigg, M.W. ; Goodson, G.R. ; Oguz, S. ; Pandurangan, V. ; Soules, C.A.N. ; Strunk, J.D. ; Wylie, J.J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i174t-e2587c37ab8fedd53aff011c5ac8d124b236e5f22a6ce389cc6fe9df70a5149c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Availability</topic><topic>Computer architecture</topic><topic>Data security</topic><topic>Encoding</topic><topic>Information security</topic><topic>Multiprocessor interconnection networks</topic><topic>Network servers</topic><topic>Pervasive computing</topic><topic>Protection</topic><topic>Secure storage</topic><toplevel>online_resources</toplevel><creatorcontrib>Ganger, G.R.</creatorcontrib><creatorcontrib>Khosla, P.K.</creatorcontrib><creatorcontrib>Bakkaloglu, M.</creatorcontrib><creatorcontrib>Bigrigg, M.W.</creatorcontrib><creatorcontrib>Goodson, G.R.</creatorcontrib><creatorcontrib>Oguz, S.</creatorcontrib><creatorcontrib>Pandurangan, V.</creatorcontrib><creatorcontrib>Soules, C.A.N.</creatorcontrib><creatorcontrib>Strunk, J.D.</creatorcontrib><creatorcontrib>Wylie, J.J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ganger, G.R.</au><au>Khosla, P.K.</au><au>Bakkaloglu, M.</au><au>Bigrigg, M.W.</au><au>Goodson, G.R.</au><au>Oguz, S.</au><au>Pandurangan, V.</au><au>Soules, C.A.N.</au><au>Strunk, J.D.</au><au>Wylie, J.J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Survivable storage systems</atitle><btitle>Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01</btitle><stitle>DISCEX</stitle><date>2001</date><risdate>2001</risdate><volume>2</volume><spage>184</spage><epage>195 vol.2</epage><pages>184-195 vol.2</pages><isbn>0769512127</isbn><isbn>9780769512129</isbn><abstract>Survivable storage systems must maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems and user accounts. These four component types can be grouped into two classes: server-side problems and client-side problems. The PASIS architecture addresses server-side problems, including the connections to those servers, by encoding data with threshold schemes and distributing trust amongst sets of storage servers. Self-securing storage addresses client and user account problems by transparently auditing accesses and versioning data within each storage server. Thus, PASIS clients use threshold schemes to protect themselves from compromised servers, and self-securing servers use full access auditing to protect their data from compromised clients. Together, these techniques can provide truly survivable storage systems.</abstract><pub>IEEE</pub><doi>10.1109/DISCEX.2001.932171</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 0769512127 |
ispartof | Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2001, Vol.2, p.184-195 vol.2 |
issn | |
language | eng |
recordid | cdi_ieee_primary_932171 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Availability Computer architecture Data security Encoding Information security Multiprocessor interconnection networks Network servers Pervasive computing Protection Secure storage |
title | Survivable storage systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T03%3A40%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Survivable%20storage%20systems&rft.btitle=Proceedings%20DARPA%20Information%20Survivability%20Conference%20and%20Exposition%20II.%20DISCEX'01&rft.au=Ganger,%20G.R.&rft.date=2001&rft.volume=2&rft.spage=184&rft.epage=195%20vol.2&rft.pages=184-195%20vol.2&rft.isbn=0769512127&rft.isbn_list=9780769512129&rft_id=info:doi/10.1109/DISCEX.2001.932171&rft_dat=%3Cieee_6IE%3E932171%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=932171&rfr_iscdi=true |