Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions
- 25 April 2005
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 329-340
- https://doi.org/10.1109/msst.2005.39
Abstract
Modern storage systems are responsible for increasing amounts of data and the value of the data itself is growing in importance. Several primary storage system solutions have emerged for the protection of data: (1) Secure Storage through Cryptography, (2) Backup and Versioning Systems, (3) Immutable and Tamper-Proof Storage, and (4) Redundant Storage. Using results from published studies, we compare these four solutions against different requirements highlighting trade-offs in performance, space, attack resistance, and cost. We also present a case study of applying these solutions based on design work at NCSA. Lastly, we conclude that while different storage protection solutions may be appropriate for different requirements, some general conclusions can be made about current state-of-the-art storage protection solutionsas well as directions for future research.Keywords
This publication has 11 references indexed in Scilit:
- Handbook of Applied CryptographyPublished by Taylor & Francis ,2018
- Improving storage system availability with D-GRAIDACM Transactions on Storage, 2005
- Cryptographic File Systems Performance: What You Don’t Know Can Hurt YouPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- The techniques and challenges of immutable storage with applications in multimediaPublished by SPIE-Intl Soc Optical Eng ,2005
- Self-securing storage: protecting data in compromised systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Design and implementation of a consistent time service for fault-tolerant distributed systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- A high-throughput low-cost AES cipher chipPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Fast and secure distributed read-only file systemACM Transactions on Computer Systems, 2002
- Survivable information storage systemsComputer, 2000
- Deciding when to forget in the Elephant file systemPublished by Association for Computing Machinery (ACM) ,1999