Strunk, 2000 - Google Patents
Architecture and Interface of a Self-Securing Object StoreStrunk, 2000
View PDF- Document ID
- 9910624918953939662
- Author
- Strunk J
- Publication year
External Links
Snippet
Ėelf-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep all versions of all data for a window of time, regardless of the commands …
- 238000003860 storage 0 abstract description 63
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99951—File or database maintenance
- Y10S707/99952—Coherency, e.g. same view to multiple users
- Y10S707/99953—Recoverability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11809605B2 (en) | Method and system for storage-based intrusion detection and recovery | |
Ganger et al. | Survivable storage systems | |
KR100984438B1 (en) | System and method for record keeping dates in JORM storage systems | |
Pennington et al. | Storage-based intrusion detection: Watching storage activity for suspicious behavior | |
US7310818B1 (en) | System and method for tracking computer viruses | |
US20040167934A1 (en) | History preservation in a computer storage system | |
US20050238175A1 (en) | Management of the retention and/or discarding of stored data | |
JPH1049416A (en) | System for backing up file of network system | |
Wani et al. | File system anti-forensics–types, techniques and tools | |
Strunk et al. | Intrusion detection, diagnosis, and recovery with self-securing storage | |
JPH0642215B2 (en) | Distributed monitoring subsystem | |
US7447850B1 (en) | Associating events with the state of a data set | |
Griffin et al. | On the feasibility of intrusion detection inside workstation disks | |
Strunk | Architecture and Interface of a Self-Securing Object Store | |
Tomonori et al. | Protecting the integrity of an entire file system | |
Hsu et al. | WORM storage is not enough [Technical Forum] | |
Strunk et al. | Design and Implementation of a Self-Securing Storage Device (CMU-CS-00-129) | |
Venema | Forensic discovery | |
Strunk | Design and Implementation of a Self-Securing Storage Device John D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig AN Soules, Gregory R. Ganger | |
Allalouf et al. | Block storage listener for detecting file-level intrusions | |
Strunk et al. | Intrusion Detection, Diagnosis, and Recovery with Self-Securing Storage (CMU-CS-02-140) | |
Wang et al. | Fast and secure append-only storage with infinite capacity | |
JP2004078860A (en) | Data protection device and system | |
US8832842B1 (en) | Storage area network external security device | |
Sheldon | Forensic analysis of Windows systems |