Information Leakage Prevention Using Virtual Disk Drive
نویسندگان
چکیده
منابع مشابه
The Forgetful Disk Drive
Approaches to data protection have traditionally focused on physical security and/or cryptographic security, but the automatic deletion of data as a form of protection has not been widely employed. However, a vast amount of data is stored that has only a limited useful life and presents a risk to privacy and security after that time period. Approaches to data deletion can be broadly classified ...
متن کاملAutomated Disk Drive Characterization
DIXtrac is a program that automatically characterizes the performance of modern disk drives. This report describes and validates DIXtrac's algorithms, which extract accurate values for over 100 performance-critical parameters in 2 { 6 minutes without human intervention or special hardware support. The extracted data include detailed layout and geometry information, mechanical timings, cache man...
متن کاملDisk Drive Failure Factors
Modern disk drives have become highly complex with increasing demands on high throughput, high reliability, high capacity, and low cost most of which are typically mutually exclusive. This paper takes a look at the reliability aspect of disk drives, and, more specifically, factors that cause a drive to fail. Failures fall into three main categories: hardware, software, and process. Many of the ...
متن کاملPreventing Information Leakage from Virtual Machines’ Memory in IaaS Clouds
Infrastructure as a Service (IaaS) provides virtual machines (VMs) to the users and its system administrators often manage the user VMs using privileged VMs called the management VM. However, the administrators are not always trustworthy from users’ point of view. If the administrators allow outside attackers to intrude in the management VM, the attackers can easily steal sensitive information ...
متن کاملInformation Leakage Prevention in Emerging Technologies (MIST 2012 Volume 2)
The ICT (Information and Communication Technologies) infrastructure has been tremendously changed during the last couple of decades and the result made a big change in the computing environment. Due to this drastic advance, now we are enjoying a convenient living environment that we couldn’t have ever experienced before. In addition to this situation, the prospective emerging technologies such ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Network and Information Security
سال: 2013
ISSN: 2074-9090,2074-9104
DOI: 10.5815/ijcnis.2013.08.03