Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01
DOI: 10.1109/discex.2001.932171
|View full text |Cite
|
Sign up to set email alerts
|

Survivable storage systems

Abstract: The design of survivable storage systems involves inherent trade-offs among properties such as performance, security, and availability. A toolbox of simple and accurate models of these properties allows a designer to make informed decisions. This report focuses on availability modeling. We describe two ways of extending the classic model of availability with a single "correlation parameter" to accommodate correlated failures. We evaluate the efficacy of the models by comparing their results with real measureme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 41 publications
(20 citation statements)
references
References 15 publications
0
20
0
Order By: Relevance
“…Because of these problems, proactive, or even verifiable proactive secret sharing schemes are rarely used in practice. However, secret sharing is applied in several archival systems such as POTSHARDS [104,105], Pasis [44], GridSharing [108], and the approaches of Hühnlein et al [58] and Masinter and Welch [69].…”
Section: Practicality and Limitationsmentioning
confidence: 99%
“…Because of these problems, proactive, or even verifiable proactive secret sharing schemes are rarely used in practice. However, secret sharing is applied in several archival systems such as POTSHARDS [104,105], Pasis [44], GridSharing [108], and the approaches of Hühnlein et al [58] and Masinter and Welch [69].…”
Section: Practicality and Limitationsmentioning
confidence: 99%
“…In order to generalize our discussion, we consider General Threshold Schemes [7] as they can represent a broad class of data distribution. This type of protocol may be particularly suited to the context of cloud storage where many levels of quality of services are often proposed.…”
Section: A Data Distributionmentioning
confidence: 99%
“…In the areas of constructing storage systems, Gregory et al [21] and SafeStore [22] have addressed issues of ensuring the system availability and integrity policies in the presence of component failures and malicious attacks.…”
Section: Related Workmentioning
confidence: 99%