Results 1 - 10
of
76
Antiquity: Exploiting a secure log for wide-area distributed storage
- In EuroSys
, 2007
"... Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all servers eventually fail and attempts to maintain data despite those failures. Antiquity uses a secure log to maintain data inte ..."
Abstract
-
Cited by 19 (5 self)
- Add to MetaCart
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all servers eventually fail and attempts to maintain data despite those failures. Antiquity uses a secure log to maintain data
Exploitation of Vulnerabilities in Cloud Storage
"... Abstract- The paper presents the vulnerabilities of cloud storage and various possible attacks exploiting these vulnerabilities that relate to cloud security, which is one of the challenging features of cloud computing. The attacks are classified into three broad categories of which the social netwo ..."
Abstract
- Add to MetaCart
networking based attacks are the recent attacks which are evolving out of existing technologies such as P2P file sharing. The study is extended to available defence mechanisms and current research areas of cloud storage. Based on the study, simple cloud storage is implemented and the major aspects
USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST ’13) 215 Getting Real: Lessons in Transitioning Research Simulations into Hardware Systems
"... Flash-based solid-state drives have revolutionized stor-age with their high performance. Their sophisticated in-ternal mechanisms have led to a plethora of research on how to optimize applications, file systems, and internal SSD designs. Due to the closed nature of commercial de-vices though, most r ..."
Abstract
- Add to MetaCart
Flash-based solid-state drives have revolutionized stor-age with their high performance. Their sophisticated in-ternal mechanisms have led to a plethora of research on how to optimize applications, file systems, and internal SSD designs. Due to the closed nature of commercial de-vices though, most
Antiquity: Exploiting a Secure Log for Wide-AreaDistributed Storage Hakim Weatherspoon*Cornell University
"... ABSTRACT Antiquity is a wide-area distributed storage system designed toprovide a simple storage service for applications like file systems and back-up. The design assumes that all servers eventually failand attempts to maintain data despite those failures. Antiquity uses a secure log to maintain da ..."
Abstract
- Add to MetaCart
ABSTRACT Antiquity is a wide-area distributed storage system designed toprovide a simple storage service for applications like file systems and back-up. The design assumes that all servers eventually failand attempts to maintain data despite those failures. Antiquity uses a secure log to maintain
Dynamic Provable Data Possession
, 2009
"... As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the provable data possession (PDP) model, the client preprocesses the data and then sends it to ..."
Abstract
-
Cited by 123 (8 self)
- Add to MetaCart
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the provable data possession (PDP) model, the client preprocesses the data and then sends
Exploiting traces in program analysis
- In Proc. Tools and Algorithms for the Construction and Analysis of Systems
, 2006
"... Abstract. From operating systems and web browsers to spacecraft, many software systems maintain a log of events that provides a partial history of execution, supporting post-mortem (or post-reboot) analysis. Unfortunately, bandwidth, storage limitations, and privacy concerns limit the information co ..."
Abstract
-
Cited by 9 (3 self)
- Add to MetaCart
requires no additional history variables to track log events, and it can slice away code that does not execute in a given trace. We describe initial experiences with implementing our ideas by extending the CBMC bounded model checker for C programs. Applying our technique to a small, 400-line file system
Earth System Science Workbench: A Data Management Infrastructure for Earth Science Products
- In Proceedings of the 13th International Conference on Scientific and Statistical Database Management
, 2001
"... The Earth System Science Workbench (ESSW) is a nonintrusive data management infrastructure for researchers who must also be data publishers. An implementation of ESSW to track the processing of locally received satellite imagery is presented, demonstrating the Workbench’s transparent and robust supp ..."
Abstract
-
Cited by 70 (5 self)
- Add to MetaCart
support for archiving and publishing data products. ESSW features a Lab Notebook metadata service, a No Duplicate-Write Once Read Many (ND-WORM) storage service, and Web user interface tools. The Lab Notebook logs processes (experiments) and their relationships via a custom API to XML documents stored
KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer
, 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract
- Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,
Improved Read Performance in a Cost-Effective, Fault-Tolerant Parallel Virtual File System (CEFT-PVFS)
- in Proceeding of IEEE/ACM Workshop on Parallel I/O in Cluster Computing and Computational Grids, in conjunction with IEEE International Symposium on Cluster Computing and the Grid (CCGRID
, 2003
"... Due to the ever-widening performance gap between processors and disks, I/0 operations tend to become the major performance bottleneck of data-intensive applications on modern clusters. If all the existing disks on the nodes of a cluster are connected together to establish high performance parallel s ..."
Abstract
-
Cited by 13 (12 self)
- Add to MetaCart
storage systems, the cluster's overall performance can be boosted at no additional cost. CEFT-PVFS (a RAID 10 style parallel file system that extends the original PVFS), as one such system, divides the cluster nodes into two groups, stripes the data across one group in a round-robin fashion
Symposium on Reliable Distributed Systems An Incremental File System Consistency Checker for Block-Level CDP Systems
"... A block-level continuous data protection (CDP) system logs every disk block update from an application server (e.g., a file or DBMS server) to a storage system so that any disk updates within a time window are undoable, and thus is able to provide a more flexible and efficient data protection servic ..."
Abstract
- Add to MetaCart
A block-level continuous data protection (CDP) system logs every disk block update from an application server (e.g., a file or DBMS server) to a storage system so that any disk updates within a time window are undoable, and thus is able to provide a more flexible and efficient data protection
Results 1 - 10
of
76