Survivable storage systems

Survivable storage systems must maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems and user accounts. These four component types can be grouped into two classes: server-side problems and client-side problems....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Ganger, G.R., Khosla, P.K., Bakkaloglu, M., Bigrigg, M.W., Goodson, G.R., Oguz, S., Pandurangan, V., Soules, C.A.N., Strunk, J.D., Wylie, J.J.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 195 vol.2
container_issue
container_start_page 184
container_title
container_volume 2
creator Ganger, G.R.
Khosla, P.K.
Bakkaloglu, M.
Bigrigg, M.W.
Goodson, G.R.
Oguz, S.
Pandurangan, V.
Soules, C.A.N.
Strunk, J.D.
Wylie, J.J.
description Survivable storage systems must maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems and user accounts. These four component types can be grouped into two classes: server-side problems and client-side problems. The PASIS architecture addresses server-side problems, including the connections to those servers, by encoding data with threshold schemes and distributing trust amongst sets of storage servers. Self-securing storage addresses client and user account problems by transparently auditing accesses and versioning data within each storage server. Thus, PASIS clients use threshold schemes to protect themselves from compromised servers, and self-securing servers use full access auditing to protect their data from compromised clients. Together, these techniques can provide truly survivable storage systems.
doi_str_mv 10.1109/DISCEX.2001.932171
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_932171</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>932171</ieee_id><sourcerecordid>932171</sourcerecordid><originalsourceid>FETCH-LOGICAL-i174t-e2587c37ab8fedd53aff011c5ac8d124b236e5f22a6ce389cc6fe9df70a5149c3</originalsourceid><addsrcrecordid>eNotjk1rwkAQQBdKwWr9Azn1DyTuzGayu0eJHxWEHmzBm0w2syVFqWRTwX9fQd_l3R5PqQx0AaD9bLHZ1ct9gVpD4Q2ChSc11rbyBAhoR2qa0o--QeSA_IvKdn_9pbtwc5S3NPz2_H3zNQ1ySq_qOfIxyfThifpaLT_r93z7sd7U823egS2HXJCcDcZy46K0LRmOUQME4uBawLJBUwlFRK6CGOdDqKL4NlrNBKUPZqKye7cTkcO5707cXw_3e_MP1rI68Q</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Survivable storage systems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Ganger, G.R. ; Khosla, P.K. ; Bakkaloglu, M. ; Bigrigg, M.W. ; Goodson, G.R. ; Oguz, S. ; Pandurangan, V. ; Soules, C.A.N. ; Strunk, J.D. ; Wylie, J.J.</creator><creatorcontrib>Ganger, G.R. ; Khosla, P.K. ; Bakkaloglu, M. ; Bigrigg, M.W. ; Goodson, G.R. ; Oguz, S. ; Pandurangan, V. ; Soules, C.A.N. ; Strunk, J.D. ; Wylie, J.J.</creatorcontrib><description>Survivable storage systems must maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems and user accounts. These four component types can be grouped into two classes: server-side problems and client-side problems. The PASIS architecture addresses server-side problems, including the connections to those servers, by encoding data with threshold schemes and distributing trust amongst sets of storage servers. Self-securing storage addresses client and user account problems by transparently auditing accesses and versioning data within each storage server. Thus, PASIS clients use threshold schemes to protect themselves from compromised servers, and self-securing servers use full access auditing to protect their data from compromised clients. Together, these techniques can provide truly survivable storage systems.</description><identifier>ISBN: 0769512127</identifier><identifier>ISBN: 9780769512129</identifier><identifier>DOI: 10.1109/DISCEX.2001.932171</identifier><language>eng</language><publisher>IEEE</publisher><subject>Availability ; Computer architecture ; Data security ; Encoding ; Information security ; Multiprocessor interconnection networks ; Network servers ; Pervasive computing ; Protection ; Secure storage</subject><ispartof>Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2001, Vol.2, p.184-195 vol.2</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/932171$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,4036,4037,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/932171$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ganger, G.R.</creatorcontrib><creatorcontrib>Khosla, P.K.</creatorcontrib><creatorcontrib>Bakkaloglu, M.</creatorcontrib><creatorcontrib>Bigrigg, M.W.</creatorcontrib><creatorcontrib>Goodson, G.R.</creatorcontrib><creatorcontrib>Oguz, S.</creatorcontrib><creatorcontrib>Pandurangan, V.</creatorcontrib><creatorcontrib>Soules, C.A.N.</creatorcontrib><creatorcontrib>Strunk, J.D.</creatorcontrib><creatorcontrib>Wylie, J.J.</creatorcontrib><title>Survivable storage systems</title><title>Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01</title><addtitle>DISCEX</addtitle><description>Survivable storage systems must maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems and user accounts. These four component types can be grouped into two classes: server-side problems and client-side problems. The PASIS architecture addresses server-side problems, including the connections to those servers, by encoding data with threshold schemes and distributing trust amongst sets of storage servers. Self-securing storage addresses client and user account problems by transparently auditing accesses and versioning data within each storage server. Thus, PASIS clients use threshold schemes to protect themselves from compromised servers, and self-securing servers use full access auditing to protect their data from compromised clients. Together, these techniques can provide truly survivable storage systems.</description><subject>Availability</subject><subject>Computer architecture</subject><subject>Data security</subject><subject>Encoding</subject><subject>Information security</subject><subject>Multiprocessor interconnection networks</subject><subject>Network servers</subject><subject>Pervasive computing</subject><subject>Protection</subject><subject>Secure storage</subject><isbn>0769512127</isbn><isbn>9780769512129</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2001</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjk1rwkAQQBdKwWr9Azn1DyTuzGayu0eJHxWEHmzBm0w2syVFqWRTwX9fQd_l3R5PqQx0AaD9bLHZ1ct9gVpD4Q2ChSc11rbyBAhoR2qa0o--QeSA_IvKdn_9pbtwc5S3NPz2_H3zNQ1ySq_qOfIxyfThifpaLT_r93z7sd7U823egS2HXJCcDcZy46K0LRmOUQME4uBawLJBUwlFRK6CGOdDqKL4NlrNBKUPZqKye7cTkcO5707cXw_3e_MP1rI68Q</recordid><startdate>2001</startdate><enddate>2001</enddate><creator>Ganger, G.R.</creator><creator>Khosla, P.K.</creator><creator>Bakkaloglu, M.</creator><creator>Bigrigg, M.W.</creator><creator>Goodson, G.R.</creator><creator>Oguz, S.</creator><creator>Pandurangan, V.</creator><creator>Soules, C.A.N.</creator><creator>Strunk, J.D.</creator><creator>Wylie, J.J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2001</creationdate><title>Survivable storage systems</title><author>Ganger, G.R. ; Khosla, P.K. ; Bakkaloglu, M. ; Bigrigg, M.W. ; Goodson, G.R. ; Oguz, S. ; Pandurangan, V. ; Soules, C.A.N. ; Strunk, J.D. ; Wylie, J.J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i174t-e2587c37ab8fedd53aff011c5ac8d124b236e5f22a6ce389cc6fe9df70a5149c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Availability</topic><topic>Computer architecture</topic><topic>Data security</topic><topic>Encoding</topic><topic>Information security</topic><topic>Multiprocessor interconnection networks</topic><topic>Network servers</topic><topic>Pervasive computing</topic><topic>Protection</topic><topic>Secure storage</topic><toplevel>online_resources</toplevel><creatorcontrib>Ganger, G.R.</creatorcontrib><creatorcontrib>Khosla, P.K.</creatorcontrib><creatorcontrib>Bakkaloglu, M.</creatorcontrib><creatorcontrib>Bigrigg, M.W.</creatorcontrib><creatorcontrib>Goodson, G.R.</creatorcontrib><creatorcontrib>Oguz, S.</creatorcontrib><creatorcontrib>Pandurangan, V.</creatorcontrib><creatorcontrib>Soules, C.A.N.</creatorcontrib><creatorcontrib>Strunk, J.D.</creatorcontrib><creatorcontrib>Wylie, J.J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ganger, G.R.</au><au>Khosla, P.K.</au><au>Bakkaloglu, M.</au><au>Bigrigg, M.W.</au><au>Goodson, G.R.</au><au>Oguz, S.</au><au>Pandurangan, V.</au><au>Soules, C.A.N.</au><au>Strunk, J.D.</au><au>Wylie, J.J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Survivable storage systems</atitle><btitle>Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01</btitle><stitle>DISCEX</stitle><date>2001</date><risdate>2001</risdate><volume>2</volume><spage>184</spage><epage>195 vol.2</epage><pages>184-195 vol.2</pages><isbn>0769512127</isbn><isbn>9780769512129</isbn><abstract>Survivable storage systems must maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems and user accounts. These four component types can be grouped into two classes: server-side problems and client-side problems. The PASIS architecture addresses server-side problems, including the connections to those servers, by encoding data with threshold schemes and distributing trust amongst sets of storage servers. Self-securing storage addresses client and user account problems by transparently auditing accesses and versioning data within each storage server. Thus, PASIS clients use threshold schemes to protect themselves from compromised servers, and self-securing servers use full access auditing to protect their data from compromised clients. Together, these techniques can provide truly survivable storage systems.</abstract><pub>IEEE</pub><doi>10.1109/DISCEX.2001.932171</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 0769512127
ispartof Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2001, Vol.2, p.184-195 vol.2
issn
language eng
recordid cdi_ieee_primary_932171
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Availability
Computer architecture
Data security
Encoding
Information security
Multiprocessor interconnection networks
Network servers
Pervasive computing
Protection
Secure storage
title Survivable storage systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T03%3A40%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Survivable%20storage%20systems&rft.btitle=Proceedings%20DARPA%20Information%20Survivability%20Conference%20and%20Exposition%20II.%20DISCEX'01&rft.au=Ganger,%20G.R.&rft.date=2001&rft.volume=2&rft.spage=184&rft.epage=195%20vol.2&rft.pages=184-195%20vol.2&rft.isbn=0769512127&rft.isbn_list=9780769512129&rft_id=info:doi/10.1109/DISCEX.2001.932171&rft_dat=%3Cieee_6IE%3E932171%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=932171&rfr_iscdi=true