Characteristics of files in NFS environments
ACM SIGSMALL/PC Notes
Disappearing cryptography: being and nothingness on the net
Disappearing cryptography: being and nothingness on the net
Deciding when to forget in the Elephant file system
Proceedings of the seventeenth ACM symposium on Operating systems principles
A Framework for Evaluating Storage System Security
FAST '02 Proceedings of the Conference on File and Storage Technologies
The evolution of storage service providers: techniques and challenges to outsourcing storage
Proceedings of the 2005 ACM workshop on Storage security and survivability
Toward a threat model for storage systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
File size distribution on UNIX systems: then and now
ACM SIGOPS Operating Systems Review
A comparison of file system workloads
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
Recovering a website's server components from the web infrastructure
Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries
De-duplication-based archival storage system
CIT'09 Proceedings of the 3rd International Conference on Communications and information technology
Hi-index | 0.00 |
Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to equipment. Users and businesses have important information that is difficult to replace, such as financial records and contacts. Reliable backups are crucial because some data cannot be replaced, while recreating other data can be expensive in terms of time and money. We propose two methods which leverage various types of free Web storage to provide simple, reliable, and free backup solutions.The first method is based on the storage of data in the caches of Internet search engines. We have developed CrawlBackup, a tool which prepares and provides the data for Web crawlers and can then restore the data from the Internet even if all the data on the original computer is unavailable. The second method, called MailBackup, stores redundant copies of the important data in the mailboxes of Internet mail services. We have successfully used these backup systems since the middle of 2005. In this paper we discuss and compare these methods, their feasibility of deployment, their security, and their flexibility.