The Archistar Secret-Sharing Backup Proxy

被引:8
作者
Happe, Andreas [1 ]
Wohner, Florian [1 ]
Loruenser, Thomas [1 ]
机构
[1] AIT, Ctr Digital Safety & Secur, Vienna, Austria
来源
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017) | 2017年
关键词
distributed system; secret sharing; cloud storage; backup system; CLOUD SERVICES; INFORMATION; SECURITY;
D O I
10.1145/3098954.3104055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud-Storage has become part of the standard toolkit for enterprise-grade computing. While being cost- and energy-efficient, cloud storage's availability and data confidentiality can be problematic. A common approach of mitigating those issues are cloud-of-cloud solutions. Another challenge is the integration of such a solution into existing legacy systems. This paper introduces the Archistar Backup Proxy which allows integration of multi-cloud storage into existing legacy enterprise computing landscapes by overloading the industry-standard Amazon S3 protocol. The paper provides multiple lessons-learned during implementation and concludes with a performance evaluation with traditional backup solutions utilizing redundant remote storage.
引用
收藏
页数:8
相关论文
共 30 条
  • [1] AlZain M. A., 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P5490, DOI 10.1109/HICSS.2012.153
  • [2] [Anonymous], 2004, OSDI
  • [3] [Anonymous], 2010, Proceedings of the 1st ACM symposium on Cloud computing
  • [4] [Anonymous], 2011, 6 INT C
  • [5] [Anonymous], 2002, ACM SIGACT NEWS
  • [6] Remote Data Checking Using Provable Data Possession
    Ateniese, Giuseppe
    Burns, Randal
    Curtmola, Reza
    Herring, Joseph
    Khan, Osama
    Kissner, Lea
    Peterson, Zachary
    Song, Dawn
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [7] DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds
    Bessani, Alysson
    Correia, Miguel
    Quaresma, Bruno
    Andre, Fernando
    Sousa, Paulo
    [J]. ACM TRANSACTIONS ON STORAGE, 2013, 9 (04)
  • [8] Bowers KD, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P187
  • [9] Practical byzantine fault tolerance and proactive recovery
    Castro, M
    Liskov, B
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04): : 398 - 461
  • [10] Chor B, 1995, AN S FDN CO, P41, DOI 10.1109/SFCS.1995.492461