Side channels in cloud services, the case of deduplication in cloud storage
|
|
|
- Bertha Miles
- 10 years ago
- Views:
Transcription
1 Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg Presented by Yair Yona Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 1 / 18
2 Outline 1 Introduction 2 Deduplication 3 Security Loophole 4 Solutions 5 Conclusions Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 2 / 18
3 Introduction Cloud storage Fast growth of data volumes: Demand for online storage services Cloud storage services: Low cost, scalable, pay-per-use Service delivered via internet Deduplication: Storing only a single copy of data Provides user a link to the existing copy Reduces storage space of service provider Decreases consumption of bandwidth from client to server Disk and bandwidth savings 90% Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 3 / 18
4 Main Contribution Introduction Pointing out security loopholes due to cross user deduplication Proposing solution that reduces the risk of data leakage Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 4 / 18
5 Deduplication Deduplication Strategies File-level: Stores a single copy of each file Block-level: Segments file to blocks. Stores single copy of each block Approaches Target-Based Approach: Dedup is handled by the storage service User is unaware of dedup Does not save bandwidth Source-Based Approach: User sends hash signature to the server If a copy already exists the file is not sent Saves bandwidth and storage Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 5 / 18
6 Security Loophole The Loophole Settings Source-based approach The client knows whether dedup has occured Cross user dedup Other users can find out whether the file was uploaded Dropbox, Mozy and Memopal apply this setting The server answers the following question by yes/no Did any user previously uploaded a copy of this file? Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 6 / 18
7 Security Loophole Attack 1: Identifying File Assumptions The file is known to the attacker Unlikely to be at the possession of any other user The attacker uploads the file and checks whether dedup was performed Dedup can answer whether the user possess the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 7 / 18
8 Security Loophole Attack 2: Finding the Content of a File Assume the number of possibilities is limited The attacker uploads each possible version of the file The deduplicated version is identical to the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 8 / 18
9 Security Loophole Attack 3: Covert Channel Assume malicious software installed on the users machine The software establishes a covert channel based on cross users dedup Bypasses the firewall and communicates with its control server Binary example The software saves two files on the users machine The files are uploaded to the users backup service The control server uploads these files to the same backup service The deduplicated file represents the binary value Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 9 / 18
10 Solutions Solution 1: Encryption Encrypting the file using personal key before uploading to the service Different keys for identical files yield different encrypted files Does not allow deduplication This solution is vulnerable to offline dictionary attacks Deduplication reveals the key May indicate that a certain user posses the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 10 / 18
11 Solutions Solution 2: Target-Based Approach Deduplication is performed on the server side Eliminates bandwidth saving The cost of transferring 1 GB is proportional to the cost of storing it for 2 month (Amazon S3 service, June 2010) Solution of Mozyhome Relatively small files are uploaded Source based deduplication is performed on larger files Effective when Sensitive data is stored in small files Most bandwidth is consumed by large files Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 11 / 18
12 Solutions Solution 3: Randomization Weakening the correlation between existence of files in the storage system and deduplication Each file is assigned with a random threshold Source based deduplication is performed when the number of copies of different users exceeds this threshold Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 12 / 18
13 Solutions Solution 3: Description For every file X select a threshold t X [2,..., d] d may be public t X is chosen uniformly at random It is known only to the server c X is the number of users that uploaded copies of the file Source based dedup occurs when either c X t X X is uploaded by a client that already uploaded it Otherwise the file is sent and target based dedup occurs Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 13 / 18
14 Solutions Solution 3: Deletions Possible attack Attacker identifies source based dedup after t uploads It then deletes two files and again uploads these copies If source based dedup occurs after only one upload it indicates that some other user uploaded the file Not very practical attack since deleted files are retained by the service for some period of time Solution When c X t X source based dedup is always performed the server must keep a copy of the file even when all files are deleted Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 14 / 18
15 Solutions Solution 3: Security Analysis Examine the case where either A single copy of the file was uploaded No copy was uploaded Seems to be the most relevant for breaching single user privacy The events are as follows Attacker uploads single copy and dedup occurs: Happens only when t X = 2 and a single copy was uploaded Attacker detects that the file was uploaded Attacker uploads d copies before dedup occurs: Happens only when t X = d and no copy was uploaded Attacker detects that the file was not uploaded Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 15 / 18
16 Solutions Solution 3: Security Analysis Attacker uploads 2 < t < d copies before dedup occurs: Either t X = t and no copy was uploaded or t X = t+1 and a copy was uploaded The probability that X was uploaded equals its a-priori probability For a fraction of 1 1 d 1 of the files the solution leaks no information that distinguish between the case where a single copy was uploaded and the case where no copy was uploaded Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 16 / 18
17 Solutions Solution 3: Implications Implications on the service provider No increase in storage For a file X bandwidth increases by t X 1 A new tradeoff is introduced: As d increases The fraction of unprotected files decreases The bandwidth consumption increases The analysis for the covert channel attack is similar to the previous one since the threshold refers to the number of users that uploaded the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 17 / 18
18 Conclusions Conclusions This work reveals security loopholes created in cloud storage services, due to deduplication Several solutions were proposed in order to deal with the security risk A randomized solution that decreases the risk for data leakage at moderate cost was proposed Since cloud storage services are becoming increasingly popular, this work may have significant impact on the privacy provided for many users Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 18 / 18
19 Conclusions Thank you for your attention!
Security of Cloud Storage: - Deduplication vs. Privacy
Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt
Side channels in cloud services, the case of deduplication in cloud storage
Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik IBM Haifa Research Lab [email protected] Benny Pinkas Bar Ilan University [email protected] Alexandra Shulman-Peleg
ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com New Challenges
Cloud Storage Security
Cloud Storage Security Sven Vowé Fraunhofer Institute for Secure Information Technology (SIT) Darmstadt, Germany SIT is a member of CASED (Center for Advanced Security Research Darmstadt) Cloud Storage
Proof of Ownership in Remote Storage Systems
Proof of Ownership in Remote Storage Systems S. Halevi, D. Harnik, B. Pinkas and A. Shulman-Peleg Summarized by Eli Haim Advanced Topics in Storage Systems School of Engineering - EE Tel Aviv University
Data Reduction: Deduplication and Compression. Danny Harnik IBM Haifa Research Labs
Data Reduction: Deduplication and Compression Danny Harnik IBM Haifa Research Labs Motivation Reducing the amount of data is a desirable goal Data reduction: an attempt to compress the huge amounts of
Secure Hybrid Cloud Architecture for cloud computing
Secure Hybrid Cloud Architecture for cloud computing Amaresh K Sagar Student, Dept of Computer science and Eng LAEC Bidar Email Id: [email protected] Sumangala Patil Associate prof and HOD Dept of
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) Pratik Raut 1, Pratik Kamble 2, Prafull Pansare 3, Dipti Salunkhe 4 1 UG Student, Dept. of Computer Engineering, JSCOE, Hadapsar, Pune,
A Survey on Deduplication Strategies and Storage Systems
A Survey on Deduplication Strategies and Storage Systems Guljar Shaikh ((Information Technology,B.V.C.O.E.P/ B.V.C.O.E.P, INDIA) Abstract : Now a day there is raising demands for systems which provide
Data Deduplication Scheme for Cloud Storage
26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we
Secure Deduplication of Encrypted Data without Additional Independent Servers
Secure Deduplication of Encrypted Data without Additional Independent Servers Jian Liu Aalto University [email protected] N. Asokan Aalto University and University of Helsinki [email protected] Benny Pinkas
M Y S E C U R E B A C K U P S E R V E R E D I T I O N. p r o d u c t o v e r v i e w O N L I N E S E R V E R B A C K U P
O N L I N E S E R V E R B A C K U P Business-class Server Backup that allows you to remotely backup a server online. Features advanced compression and de-duplication to speed backups and minimize space.
Deduplication Demystified: How to determine the right approach for your business
Deduplication Demystified: How to determine the right approach for your business Presented by Charles Keiper Senior Product Manager, Data Protection Quest Software Session Objective: To answer burning
!!!! Memeo C1 Security !!!!!!!!!!! Bret Savage, CTO. October 2013. 2013 Memeo Inc. All rights reserved. 2013 Memeo Inc. All rights reserved.
Memeo C1 Security Bret Savage, CTO October 2013 2013 Memeo Inc. All rights reserved. 2013 Memeo Inc. All rights reserved. Guiding Principles Memeo C1 was scratch-built from the ground up to be the ultimate
DXi Accent Technical Background
TECHNOLOGY BRIEF NOTICE This Technology Brief contains information protected by copyright. Information in this Technology Brief is subject to change without notice and does not represent a commitment on
Data In The Cloud: Who Owns It, and How Do You Get it Back?
Data In The Cloud: Who Owns It, and How Do You Get it Back? Presented by Dave Millier, Soban Bhatti, and Oleg Sotnikov 2013 Sentry Metrics Inc. Agenda Reasons for Cloud Adoption How Did My Data Get There?
FOR THE FUTURE OF DATA CENTERS?
WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? A WHITEPAPER BROUGHT TO YOU BY SEI WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? files via the Internet to a hard drive located in a
DETECTION OF PEER TO PEER APPLICATIONS
DETECTION OF PEER TO PEER APPLICATIONS AN OPSWAT WHITE PAPER Author: Priti Dadlani Contributors: Benny Czarny, Steven Ginn, Toshit Antani April 2008 OPSWAT, INC. www.opswat.com CONTENTS Introduction...
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Deduplication has been around for several
Demystifying Deduplication By Joe Colucci Kay Benaroch Deduplication holds the promise of efficient storage and bandwidth utilization, accelerated backup and recovery, reduced costs, and more. Understanding
Analyzing the Security Schemes of Various Cloud Storage Services
Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services
Cumulus: filesystem backup to the Cloud
Michael Vrable, Stefan Savage, a n d G e o f f r e y M. V o e l k e r Cumulus: filesystem backup to the Cloud Michael Vrable is pursuing a Ph.D. in computer science at the University of California, San
Demystifying Deduplication for Backup with the Dell DR4000
Demystifying Deduplication for Backup with the Dell DR4000 This Dell Technical White Paper explains how deduplication with the DR4000 can help your organization save time, space, and money. John Bassett
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
SPECIAL REPORT. Data Deduplication. Deep Dive. Put your backups on a diet. Copyright InfoWorld Media Group. All rights reserved.
SPECIAL REPORT Data Deduplication Deep Dive Put your backups on a diet Copyright InfoWorld Media Group. All rights reserved. Sponsored by 2 Data deduplication explained How to reduce backup overhead and
Privacy and Verifiability for Data Storage in Cloud Computing. Melek Ӧnen August 17, 2015 IFIP Summer School, Edinburgh
Privacy and Verifiability for Data Storage in Cloud Computing Melek Ӧnen August 17, 2015 IFIP Summer School, Edinburgh Cloud Computing Outsourcing storage & computation High availability No IT maintenance
Turnkey Deduplication Solution for the Enterprise
Symantec NetBackup 5000 Appliance Turnkey Deduplication Solution for the Enterprise Mayur Dewaikar Sr. Product Manager, Information Management Group White Paper: A Deduplication Appliance Solution for
Security Issues with Sharing (Cloud Storage Services) Kalyani Haridasyam EECS710: Information Security and Assurance University of Kansas
Security Issues with Sharing (Cloud Storage Services) Kalyani Haridasyam EECS710: Information Security and Assurance University of Kansas Topics Introduction Data Sharing Dropbox and Sharing Dropbox Security
VANGUARD ONLINE BACKUP
VANGUARD ONLINE BACKUP Product Description Vanguard Online Backup is a world class solution that automates off-site and on-site backups. The application combines an easy to use interface with powerful
LDA, the new family of Lortu Data Appliances
LDA, the new family of Lortu Data Appliances Based on Lortu Byte-Level Deduplication Technology February, 2011 Copyright Lortu Software, S.L. 2011 1 Index Executive Summary 3 Lortu deduplication technology
DiamondStream Data Security Policy Summary
DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Tresorit s DRM. A New Level of Security for Document Collaboration and Sharing
Tresorit s DRM A New Level of Security for Document Collaboration and Sharing Cloud-based storage has made it easier for business users to share documents, but it has also opened up new vulnerabilities.
Open Source Data Deduplication
Open Source Data Deduplication Nick Webb Red Wire Services, LLC [email protected] www.redwireservices.com @disasteraverted Introduction What is Deduplication? Different kinds? Why do you want it?
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
Storing & Synchronizing Data In The Cloud
Storing & Synchronizing Data In The Cloud Val D. Steed, CPA, MA, CITP CEO K2 Enterprises Copyright 2012, K2E, LLC. Reproduction or reuse for purposes other than a K2 Enterprises training event is prohibited.
Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System
Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System Debarghya Das Cornell University, Ithaca, NY 14850 [email protected] Abstract Most cloud storage platforms today offer a centralized
Lecture 11. RFS A Network File System for Mobile Devices and the Cloud
Lecture 11 RFS A Network File System for Mobile Devices and the Cloud Yuan Dong, Jinzhan Peng, Dawei Wang, Haiyang Zhu, Fang Wang, Sun C. Chan, Michael P. Mesnier Advanced Operating Systems January 4th,
Comparing Box and Egnyte. White Paper
White Paper Revised July, 2013 Introduction File storage in the cloud has broad appeal for individuals as well as large businesses. At a macro level, there are two types of file storage/sharing solutions:
A Survey on Hybrid Cloud with De-Duplication
A Survey on Hybrid Cloud with De-Duplication Pooja S Dodamani, Pradeep Nazareth M. Tech Student, Dept. of Computer science and Engineering, NMAMIT, Karnataka, India Assistant Professor, Dept. of Computer
Confinement Problem. The confinement problem Isolating entities. Example Problem. Server balances bank accounts for clients Server security issues:
Confinement Problem The confinement problem Isolating entities Virtual machines Sandboxes Covert channels Mitigation 1 Example Problem Server balances bank accounts for clients Server security issues:
Application Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
Installation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
Backing Up Your Files. External Hard Drives
Backing Up Your Files As we become more and more dependent on technology to help accomplish our everyday tasks, we tend to forget how easily the information stored on our computers can be lost. Imagine
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE IN THIRD-PARTY COMPUTE CLOUDS T. Ristenpart, H. Shacham, S. Savage UC San Diego E. Tromer MIT CPCS 722: Advanced Systems Seminar Ewa Syta GET
FAQ. Hosted Data Disaster Protection
Hosted Data Disaster Protection Flexiion is based in the UK and delivers Infrastructure as a Service (IaaS) solutions, making the advantages of the Cloud and IaaS more accessible to mid-size, professional
Data Deduplication in Tivoli Storage Manager. Andrzej Bugowski 19-05-2011 Spała
Data Deduplication in Tivoli Storage Manager Andrzej Bugowski 19-05-2011 Spała Agenda Tivoli Storage, IBM Software Group Deduplication concepts Data deduplication in TSM 6.1 Planning for data deduplication
Move from traditional IT Solutions to Cloud Computing. Mauritius Telecom your partner for Cloud services
Move from traditional IT Solutions to Cloud Computing In today s global business arena, innovation is important for business growth. To innovate, your business depends on IT efficiency, reliability and
REMOTE BACKUP-WHY SO VITAL?
REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote
Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
IaaS. Move from traditional IT Solutions to Cloud Computing. Mauritius Telecom your partner for Cloud services. PaaS
Move from traditional IT Solutions to Cloud Computing In today s global business arena, innovation is important for business growth. To innovate, your business depends on IT efficiency, reliability and
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression Sponsored by: Oracle Steven Scully May 2010 Benjamin Woo IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Redefining Microsoft SQL Server Data Management. PAS Specification
Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing
Symantec NetBackup 7.5 What s New and Version Comparison Matrix
Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single
Talk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE
One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE Prevent Data Loss with Remote Online Backup Service The U.S. National Archives & Records Administration states that
3Gen Data Deduplication Technical
3Gen Data Deduplication Technical Discussion NOTICE: This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change without notice and
PREVENTIA. Skyhigh Best Practices and Use cases. Table of Contents
PREVENTIA Forward Thinking Security Solutions Skyhigh Best Practices and Use cases. Table of Contents Discover Your Cloud 1. Identify all cloud services in use & evaluate risk 2. Encourage use of low-risk
Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.
Certificate Authorities and Public Keys How they work and 10+ ways to hack them. -- FoxGuard Solutions Www.FoxGuardSolutions.com [email protected] Version.05 9/2012 1 Certificate Use Overview
Two-Level Metadata Management for Data Deduplication System
Two-Level Metadata Management for Data Deduplication System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3.,Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea { kongjs,
Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation
Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Roşu and Michael Steiner Rutgers
Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication
Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication Table of Contents Introduction... 3 Shortest Possible Backup Window... 3 Instant
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
How To Get To A Cloud Storage And Byod System
Maginatics Security Architecture What is the Maginatics Cloud Storage Platform? Enterprise IT organizations are constantly looking for ways to reduce costs and increase operational efficiency. Although
SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 5, October 2015 (ISSN 2278 5973)
SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 5, October 2015 (ISSN 2278 5973) Cloud Computing: Security Issues In Infrastructure-As-A-Service Model
Checklist and Tips to Choosing the Right Backup Strategy
E-Guide Checklist and Tips to Choosing the Right Backup Strategy Data deduplication is no longer just a cool technology, it's become a fairly common component of modern data backup strategies. Learn how
Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services
Pixius Advantage Outsourcing Managed Services Move forward with endpoint protection by understanding its unique requirements. As the number of information workers rises, so does the growth and importance
Cloud Computing and Amazon Web Services
Cloud Computing and Amazon Web Services Gary A. McGilvary edinburgh data.intensive research 1 OUTLINE 1. An Overview of Cloud Computing 2. Amazon Web Services 3. Amazon EC2 Tutorial 4. Conclusions 2 CLOUD
SDFS Overview. By Sam Silverberg
SDFS Overview By Sam Silverberg Why did I do this? I had an Idea that I needed to see if it worked. Design Goals Create a dedup file system capable of effective inline deduplication for Virtual Machines
Understanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection
Top Ten Questions. to Ask Your Primary Storage Provider About Their Data Efficiency. May 2014. Copyright 2014 Permabit Technology Corporation
Top Ten Questions to Ask Your Primary Storage Provider About Their Data Efficiency May 2014 Copyright 2014 Permabit Technology Corporation Introduction The value of data efficiency technologies, namely
Logz.io See the logz that matter
See the logz that matter How Logz.io Secures Customer Log Data White Paper A certain amount of confidence is needed when relying on third party vendors to manage and handle your online data and log files
