ACM Transactions on Computer Systems (TOCS)
The HP AutoRAID hierarchical storage system
ACM Transactions on Computer Systems (TOCS) - Special issue on operating system principles
Virtual log based file systems for a programmable disk
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
Soft updates: a solution to the metadata update problem in file systems
ACM Transactions on Computer Systems (TOCS)
Bridging the Information Gap in Storage Protocol Stacks
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
Recent Filesystem Optimisations on FreeBSD
Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference
Improving storage system availability with D-GRAID
ACM Transactions on Storage (TOS)
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
Semantically-Smart Disk Systems
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Self-securing storage: protecting data in compromised system
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Trading capacity for performance in a disk array
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Secure data deletion for Linux file systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Storage-based intrusion detection: watching storage activity for suspicious behavior
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
TCON'95 Proceedings of the USENIX 1995 Technical Conference Proceedings
Secure deletion of data from magnetic and solid-state memory
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
A comparison of file system workloads
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
A framework for evaluating storage system security
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
IEEE Communications Magazine
Proceedings of the twentieth ACM symposium on Operating systems principles
Proceedings of the twentieth ACM symposium on Operating systems principles
Semantically-smart disk systems: past, present, and future
ACM SIGMETRICS Performance Evaluation Review - Design, implementation, and performance of storage systems
Geiger: monitoring the buffer cache in a virtual machine environment
Proceedings of the 12th international conference on Architectural support for programming languages and operating systems
An approach to virtual allocation in storage systems
ACM Transactions on Storage (TOS)
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Secure deletion for a versioning file system
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Database-aware semantically-smart storage
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Secure file system versioning at the block level
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
A nine year study of file system and storage benchmarking
ACM Transactions on Storage (TOS)
HPDC '08 Proceedings of the 17th international symposium on High performance distributed computing
Practical techniques for purging deleted data using liveness information
ACM SIGOPS Operating Systems Review - Research and developments in the Linux kernel
ScaleFFS: A scalable log-structured flash file system for mobile multimedia systems
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Selective versioning in a secure disk system
SS'08 Proceedings of the 17th conference on Security symposium
WorkOut: I/O workload outsourcing for boosting RAID reconstruction performance
FAST '09 Proccedings of the 7th conference on File and storage technologies
A peer-to-peer IO buffering service based on RAM-grid
International Journal of Autonomous and Adaptive Communications Systems
Semantic WEB service data object management
CCDC'09 Proceedings of the 21st annual international conference on Chinese Control and Decision Conference
A survey of confidential data storage and deletion methods
ACM Computing Surveys (CSUR)
Avoiding file system micromanagement with range writes
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
Keeping data secret under full compromise using porter devices
Proceedings of the 26th Annual Computer Security Applications Conference
Differentiated storage services
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
FlashLight: A Lightweight Flash File System for Embedded Systems
ACM Transactions on Embedded Computing Systems (TECS)
Proceedings of the VLDB Endowment
TrueErase: per-file secure deletion for the storage data path
Proceedings of the 28th Annual Computer Security Applications Conference
Improving I/O performance using virtual disk introspection
HotStorage'13 Proceedings of the 5th USENIX conference on Hot Topics in Storage and File Systems
Hi-index | 0.00 |
A fundamental piece of information required in intelligent storage systems is the liveness of data. We formalize the notion of liveness within storage, and present two classes of techniques for making storage systems liveness-aware. In the explicit notification approach, we present robust techniques by which a file system can impart liveness information to storage through a "free block" command. In the implicit detection approach, we show that such information can be inferred by the storage system efficiently underneath a range of file systems, without changes to the storage interface. We demonstrate our techniques through a prototype implementation of a secure deleting disk. We find that while the explicit interface approach is desirable due to its simplicity, the implicit approach is easy to deploy and enables quick demonstration of new functionality, thus facilitating rapid migration to an explicit interface.