Proceedings of the 2005 ACM Workshop on Storage Security and Survivability 2005
DOI: 10.1145/1103780.1103784
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring data integrity in storage

Abstract: Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for storage, interesting challenges arise in ensuring data integrity. In this paper, we discuss the causes of integrity violations in storage and present a survey of integrity assurance techniques that exist today. We describe several interesting applications of storage integrity checking, apart from security, and discuss the implementation is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0
1

Year Published

2009
2009
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 80 publications
(45 citation statements)
references
References 26 publications
0
44
0
1
Order By: Relevance
“…Sivathanu, Wright, and Zadok [14] have presented a review of data integrity mechanisms in generic storage file systems. They are applicable to cloud storage services as well.…”
Section: ) Storage Server Technologiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Sivathanu, Wright, and Zadok [14] have presented a review of data integrity mechanisms in generic storage file systems. They are applicable to cloud storage services as well.…”
Section: ) Storage Server Technologiesmentioning
confidence: 99%
“…The data integrity problem in the cloud has been studied from a variety of perspectives ranging from storage technologies [14] [16][18] [20][22] to architecture [24][25] to standards [28][30] (see details in Section II). One of the drawbacks of these approaches is that the data integrity problem has been coupled together with other problems and has not received treatment in isolation.…”
Section: Introductionmentioning
confidence: 99%
“…If a malicious person inserts the same value into the original and mirrored data, the MT can not detect the integrity violation, and the inserted data is considered as part of the original data. MT can not also detect integrity violation by user errors [4].…”
Section: Mirroring Technique (Mt)mentioning
confidence: 99%
“…There are several factors that cause unexpected or unauthorized modifications to stored data. This includes hardware or software malfunctions, and malicious intrusions [4]. Data can get corrupted due to hardware or software malfunctions.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation