Paranoia vs. Performance - A Quantitative Evaluation of Storage System Security

نویسندگان

  • Erik Riedel
  • Mahesh Kallahalla
  • Ram Swaminathan
چکیده

As users’ and companies’ dependence on shared, networked data continues to increase, the protection of this data from prying eyes or malicious hands becomes more and more critical. There are a variety of ways to ensure the security of data and the integrity of data transfer, depending on the set of anticipated attacks, the level of paranoia on the part of the data owners, and the level of inconvenience data users are willing to tolerate. This paper reviews all the previously proposed systems for secure, networked storage, and combines these ideas to describe a system for the “most paranoid” data owners. We show that the two main classes of systems in the existing design space are not really as far apart as they seem; one is essentially an optimization of the other. We outline the space of possible design choices and quantify the costs associated with each one using a trace from a time-sharing UNIX server used by a medium-sized workgroup. As we go along, we introduce a number of optimizations that have not been explicitly considered before.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Framework for Evaluating Storage System Security

There are a variety of ways to ensure the security of data and the integrity of data transfer, depending on the set of anticipated attacks, the level of paranoia on the part of the data owners, and the level of inconvenience users are willing to tolerate. Current storage systems secure data either by encrypting data on the wire, or by encrypting data on the disk. These systems seem very differe...

متن کامل

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

Security-Constrained Unit Commitment Considering Large-Scale Compressed Air Energy Storage (CAES) Integrated With Wind Power Generation

Environmental concerns and depletion of nonrenewable resources has made great interest towards renewable energy resources. Cleanness and high potential are factors that caused fast growth of wind energy. However, the stochastic nature of wind energy makes the presence of energy storage systems (ESS) in wind integrated power systems, inevitable. Due to capability of being used in large-scale sys...

متن کامل

Evaluation of Peak Shifting and Energy Saving Potential of Ice Storage Based Air Conditioning Systems in Iran

Thermal energy storage (TES) system has been introduced as a practical facility for shifting load from peak hours to off-peak hours. Because of different energy consumption during day and night, peak and off peak period is created on load curve. Ice storage technology which is a kind of TES system, is implemented in different points of the world with the purpose of solving load shifting problem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001