2000
DOI: 10.1109/2.863969
|View full text |Cite
|
Sign up to set email alerts
|

Survivable information storage systems

Abstract: Availability and confidentiality of information are primary goals of many information systems. Most systems enhance availability by providing full replication, The PASIS architecture flexibly and efficiently combines proven technologies for constructing information storage systems whose availability, confidentiality, and integrity policies can survive component failures and malicious attacks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
82
0
1

Year Published

2003
2003
2012
2012

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 147 publications
(83 citation statements)
references
References 13 publications
0
82
0
1
Order By: Relevance
“…In this paper, we will refer to this ubiquitous form of clusters as a flat cluster (Figure 1). Examples of such systems exist in both research [4,24,9] and commercial [10,1] settings.…”
Section: Conventional Approachmentioning
confidence: 99%
“…In this paper, we will refer to this ubiquitous form of clusters as a flat cluster (Figure 1). Examples of such systems exist in both research [4,24,9] and commercial [10,1] settings.…”
Section: Conventional Approachmentioning
confidence: 99%
“…(d) Rabin's information dispersal algorithm (1-m-n) offers a range of storage solutions that show trade-off between availability and required storage space. Like decimation, it does not offer confidentiality [6]. The threshold schemes can be used instead of cryptographic techniques to guarantee the confidentiality, and multiple schemes can be combined.…”
Section: Related Workmentioning
confidence: 99%
“…Secret sharing improves the security guarantees by forcing an adversary to breach multiple archival sites to obtain meaningful information about the data. Several recently proposed archival systems such as POTSHARDS [22], PASIS [25,7], and GridSharing [23] employ secret sharing schemes for this reason.…”
Section: Long Term Data Confidentialitymentioning
confidence: 99%
“…The right choice of these parameters depends on several factors, including expected workload, system component characteristics, and the desired levels of availability and security. PASIS [25,7,24] proposes analytic techniques to ascertain the right secret sharing parameters for a given system. FlexArchive builds upon the insights provided by this body of work for determining appropriate values for these parameters.…”
Section: Re-configuration In Flexarchive: Key Concernsmentioning
confidence: 99%