Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Ensuring data integrity in storage: techniques and applications
Sivathanu G., Wright C., Zadok E.  Storage security and survivability (Proceedings of the 2005 ACM Workshop on Storage Security and Survivability, Fairfax, VA, Nov 11, 2005)26-36.2005.Type:Proceedings
Date Reviewed: Apr 4 2006

Storage is an important issue in information technology, so this survey paper is timely. The paper looks at a detailed spectrum of integrity assurance techniques in the storage arena. The data sets that we are handling today are several orders of magnitude larger than data sets that were handled in past years; it is critical to ensure that this data remains accurate, and to capture anomalies if they exist.

Data can be corrupted by a variety of means, including hardware errors or malicious intrusions like virus attacks. This paper surveys such common violations. The paper then presents techniques to ensure the integrity of data, such as mirroring, redundant array of independent disks (RAID) systems, journaling file systems, and cryptographic file systems. The paper also goes into the applications of such systems, and various implementation choices.

From a survey point of view, this is a good starting point for anyone interested in getting up to speed on the state of the art in this field. The numerous references given along the way will help researchers and practitioners who want to learn more about a specific subject area. The authors also propose an integrity assurance technique called logical redundancy. However, it is not clear what the exact nature of the original contribution of the authors is in this area. The authors say that they are borrowing a method from the database field, and applying it to the storage integrity problem. The explanation, however, is not detailed enough, and does not contain any empirical results comparing its performance to other techniques. The paper’s main focus is its detailed survey of storage integrity issues. This is achieved nicely.

Reviewer:  Naga Narayanaswamy Review #: CR132614 (0701-0059)
Bookmark and Share
  Featured Reviewer  
 
General (B.8.0 )
 
 
Cryptographic Controls (D.4.6 ... )
 
 
Fault-Tolerance (D.4.5 ... )
 
 
File Systems Management (D.4.3 )
 
 
Reliability (D.4.5 )
 
 
Security and Protection (D.4.6 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "General": Date
A common multi-platform hardware object model
Armstrong J., Kreissig A.  Conference on Object Oriented Programming Systems Languages and Applications (OOPSLA 2002 Practitioners Reports, Seattle, Washington, Nov 4-8, 2002)1-ff, 2002. Type: Proceedings
Jan 21 2004
Performance and dependability evaluation of scalable massively parallel computer systems with conjoint simulation
Hein A., Cin M. ACM Transactions on Modeling and Computer Simulation 8(4): 333-373, 1998. Type: Article
Jul 1 1999
Pruning-based, energy-optimal, deterministic I/O device scheduling for hard real-time systems
Swaminathan V., Chakrabarty K. ACM Transactions on Embedded Computing Systems 4(1): 141-167, 2005. Type: Article
Jun 15 2005
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy