期刊文献+

存储系统的易存活性机制

Survivability Mechanisms for Storage System
下载PDF
导出
摘要 把当前存储系统使用的易存活性安全机制分为空间分布的数据拷贝和自安全的存储设备两类,构建的数据中心采用类似后者的方法,通过建立合法用户的行为库识别可能的攻击。预见今后存储设备的智能化趋势将越来越明显,存储设备的自安全和多种安全机制的融合将是未来存储系统易存活性的发展方向。 Security mechanisms for survivability used in current storage systems are divided into two classes, including distributed data copies on wide scale and self-security storage devices. The data center now this paper deploys employs the method resembling the latter, which sets up access patterns database to identify possible attacks. The paper predicts as storage device becomes more intelligent self-security storage device and combination of different security mechanisms will direct the development of survivable storage system.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第11期185-187,共3页 Computer Engineering
基金 国家"973"重点基础研究项目:新型超高密度 超快速光信息存储与处理基础研究(G19990330)
关键词 易存活性存储系统 自安全存储设备 攻击 Survivable storage system Self-security storage device Attack
  • 相关文献

参考文献5

  • 1Riedel E,Kallahalla M,Swaminathan R.A Frame for Evaluating Storage System Security.In Proceeding of the 1^st Conference on File and Storage Technologies (FAST),Monterey,CA,2002-01.
  • 2Wylie J,Bigrigg M,Strunk J,et al.Survivable Information Storage Systems.IEEE Computer,2000-08.
  • 3Kubiatowicz J,Bindel D,Chen Y,et al.Ocean Store: An Architecture for Global-scale Persistent Storage.ASPLOS,2000-12.
  • 4Strunk J,Goodson G,Scheinholtz M,et al.Self-securing Storage: Protecting Data in Compromised System.OSDI,2000-10.
  • 5Pennington A G,Strunk J D,Griffin J L,et al.Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior.Proceeding of the 12^th USENIX Security Symposium Washington.DC,2003-08.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部