Paranoia vs. Performance - A Quantitative Evaluation of Storage System Security
نویسندگان
چکیده
As users’ and companies’ dependence on shared, networked data continues to increase, the protection of this data from prying eyes or malicious hands becomes more and more critical. There are a variety of ways to ensure the security of data and the integrity of data transfer, depending on the set of anticipated attacks, the level of paranoia on the part of the data owners, and the level of inconvenience data users are willing to tolerate. This paper reviews all the previously proposed systems for secure, networked storage, and combines these ideas to describe a system for the “most paranoid” data owners. We show that the two main classes of systems in the existing design space are not really as far apart as they seem; one is essentially an optimization of the other. We outline the space of possible design choices and quantify the costs associated with each one using a trace from a time-sharing UNIX server used by a medium-sized workgroup. As we go along, we introduce a number of optimizations that have not been explicitly considered before.
منابع مشابه
A Framework for Evaluating Storage System Security
There are a variety of ways to ensure the security of data and the integrity of data transfer, depending on the set of anticipated attacks, the level of paranoia on the part of the data owners, and the level of inconvenience users are willing to tolerate. Current storage systems secure data either by encrypting data on the wire, or by encrypting data on the disk. These systems seem very differe...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملSecurity-Constrained Unit Commitment Considering Large-Scale Compressed Air Energy Storage (CAES) Integrated With Wind Power Generation
Environmental concerns and depletion of nonrenewable resources has made great interest towards renewable energy resources. Cleanness and high potential are factors that caused fast growth of wind energy. However, the stochastic nature of wind energy makes the presence of energy storage systems (ESS) in wind integrated power systems, inevitable. Due to capability of being used in large-scale sys...
متن کاملEvaluation of Peak Shifting and Energy Saving Potential of Ice Storage Based Air Conditioning Systems in Iran
Thermal energy storage (TES) system has been introduced as a practical facility for shifting load from peak hours to off-peak hours. Because of different energy consumption during day and night, peak and off peak period is created on load curve. Ice storage technology which is a kind of TES system, is implemented in different points of the world with the purpose of solving load shifting problem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001