[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Strunk, 2000 - Google Patents

Architecture and Interface of a Self-Securing Object Store

Strunk, 2000

View PDF
Document ID
9910624918953939662
Author
Strunk J
Publication year

External Links

Snippet

Ėelf-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep all versions of all data for a window of time, regardless of the commands …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99951File or database maintenance
    • Y10S707/99952Coherency, e.g. same view to multiple users
    • Y10S707/99953Recoverability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Similar Documents

Publication Publication Date Title
US11809605B2 (en) Method and system for storage-based intrusion detection and recovery
Ganger et al. Survivable storage systems
KR100984438B1 (en) System and method for record keeping dates in JORM storage systems
Pennington et al. Storage-based intrusion detection: Watching storage activity for suspicious behavior
US7310818B1 (en) System and method for tracking computer viruses
US20040167934A1 (en) History preservation in a computer storage system
US20050238175A1 (en) Management of the retention and/or discarding of stored data
JPH1049416A (en) System for backing up file of network system
Wani et al. File system anti-forensics–types, techniques and tools
Strunk et al. Intrusion detection, diagnosis, and recovery with self-securing storage
JPH0642215B2 (en) Distributed monitoring subsystem
US7447850B1 (en) Associating events with the state of a data set
Griffin et al. On the feasibility of intrusion detection inside workstation disks
Strunk Architecture and Interface of a Self-Securing Object Store
Tomonori et al. Protecting the integrity of an entire file system
Hsu et al. WORM storage is not enough [Technical Forum]
Strunk et al. Design and Implementation of a Self-Securing Storage Device (CMU-CS-00-129)
Venema Forensic discovery
Strunk Design and Implementation of a Self-Securing Storage Device John D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig AN Soules, Gregory R. Ganger
Allalouf et al. Block storage listener for detecting file-level intrusions
Strunk et al. Intrusion Detection, Diagnosis, and Recovery with Self-Securing Storage (CMU-CS-02-140)
Wang et al. Fast and secure append-only storage with infinite capacity
JP2004078860A (en) Data protection device and system
US8832842B1 (en) Storage area network external security device
Sheldon Forensic analysis of Windows systems