Anonymizing Filesystem Metadata for Analysis
|
|
- Steven Shepherd
- 8 years ago
- Views:
Transcription
1 Anonymizing Filesystem Metadata for Analysis Chris Xin Symantec 2006 Symantec Corporation, All Rights Reserved
2 Challenges of Filesystem Analysis Real-time live-system monitoring is difficult. performance degradation security & privacy concerns stability risk Traces difficult to reconstruct I/O dependencies system states security & privacy concerns Benchmarks There are lies, damn lies and then there are benchmarks. Filesystem images snapshot, backups security & privacy concerns
3 Agenda Challenges of filesystem analysis Keeping filesystem images metasave Metadata anonymization secure metasave Measurement space efficiency time efficiency resource consumption Summary
4 Filesystem Images Storing the whole system would be expensive. large storage space long time Keeping metadata is a wise idea. A good resource for understanding some characteristics of a file system Cumulative images can be obtained to track the change trend of a file system file size, age, type information filesystem aging analysis Address some privacy concerns by eliminating user data Some file systems already provide such a utility. Ext2: e2image Linux NTFS: ntfsclone --metadata VxFS: metasave
5 Metasave Utility The utility saves or restores the metadata of VxFS Available in version 1 and later versions. Metadata is kept in a way that the original geometry of a file system is preserved and all the inode information is intact. No user data is retained. Metadata can be saved on top of a snapshot, a backup, or a live system as an image file. The image file can be deflated and metadata can be restored back to a file or a device. What do we do with images? troubleshooting debugging file system analysis
6 Efficient Anonymization But your clients may say no Sensitive information is still in the file and directory names Concerns of performance degradation Solution: Anonymize clients information in metadata Names of files and directories Client information in file system intent logs Requirements Must be difficult to recover original information Keep the geometry of the file system: retain the length of the file/directory names Time efficient Space efficient Minimum performance degradation
7 Secure Metasave Enhanced metasave with encryption options Evolved from metasave, a VxFS utility for saving/restoring metadata of a file system Online image saving Use cryptographic message digest algorithm to obfuscate client information The algorithm can be chosen by a client s requirement Default: SHA-1
8 Message Digest Secure one-way hash function: e=h(m) M: original message H: hash function e: digested message Key properties Given M, easy to compute e=h(m) Given e, hard to compute M such that e=h(m) Given M, hard to find M' (different from M) such that H(M)=H(M') (minimum collision)
9 Implementation OpenSSL library Obfuscate a file/directory name Do it by individual pathname components /a/bc/bcd /x/rd/wyz Retain name length Digest works on a fixed length of characters at a time. 20 characters for SHA-1 If len(name) > len(digest), process it in segments. If len(name) < len(digest) or len(final segment) < len(digest), digest the name string and remove some characters to preserve its original length. Digest can contain characters that are illegal in file/directory names; map them to legal characters.
10 File/Directory Name Manipulation original name string 0 79 digests chop to org. length 0 67 obfuscated filename Parse a name string Message digest Chop it to its original length Random number generator with a changeable seed Character mapping 0 67
11 Obfuscation Options Full-name obfuscation Retain file extension if any Obfuscate extensions as well and make them consistent obfuscation option original name foo1.c foo2.c full-name abcde uwxyz retain file extension jkis.c swdx.c consistent extension jkis.x swdx.x
12 Further Handling Multiple extensions and prefixes for name-only obfuscation option Look at the last extension only foo.c.bak abced.bak retain extension of 4 or less; obfuscate anything bigger Do not obfuscate the name of special administrative files or directories lost+found Rebuild directory indexes and block checksums after name obfuscation Symlinks Point to the same place within the file system.. is kept intact Intent logs Offers an option to not include intent logs in an image file. If intent log is retained, file and directory names are obfuscated.
13 Collision Probability What s a collision? Two files/directories with different names, say A and B, end up with the same name after obfuscation. Do we have to worry about it? Not really Collision only matters within individual directories. Chance of collision is tiny With SHA-1, 1 in possibility for a filesystem with a trillion file/directory names, and 1 in for quadrillion names. The character mapping and name length chopping increase the chance of collisions slightly. An optional name conflict check is followed after obfuscation for a file system with large directories.
14 Measurement Three categories Space consumption Time consumption encryption overhead Resource consumption Six filesystems measured four customer filesystems two filesystems on our production server (fs #2 and #6) Experiment environment Live production system Sun Fire E Sparc CPUs, 32GB memory, shared disks Test machine Sun Fire V240 2 Sparc CPUs, 2GB memory, single-user disks
15 Space Efficiency The image of metadata usually takes about 1-5% of the filesystem size. storage efficiency % of image over fs size % of total cap. % of used cap. filesystem
16 Time Efficiency How long does it take to get an anonymized file system image? use filename-only option on the live production system about 30 minutes to get an encrypted metadata image from fs # secs for fs #2. on the test machine: time efficiency time (sec) filesystem
17 A closer look The factors in play # of inodes total filesystem size filesystem capacity fs # files time (sec) time (sec) msv size/ msv size/ total(gb) used(gb) production test total fs cap. used fs cap % 0.12% ,721 59, ,180 2,259, % 0.04% 0.05% 6.88% 0.60% 0.08% 0.73% 0.56% 11.73% 0.63%
18 Encryption Overhead Space efficiency is the same. time efficiency Little overhead introduced on a live production system I/O bounded shared disk Noticeable computational overhead on the test machine.
19 Encryption Overhead on the Test Machine normalized time no-encryption full-obfuscation filename-only consistent-extension file system
20 Encryption Overhead on the Production System normalized time no-encryption full-obfuscation filename-only consistent-extension file system
21 Resource Consumption Not much performance degradation during image saving 20 MB memory and 1% of CPU were utilized during the image dumping on a live production system.
22 Summary A method of anonymizing filesystem metadata. Obfuscate clients information to relieve privacy concerns Cost 1-5% storage of the original file system size. Fairly quick process and little performance degradation. We encourage saving file metadata images with anonymization. Provide a good resource for file system analysis Benefit both development and research The anonymization scheme can be used in other file system utilities, such as trace collecting.
23 References Bruce Schneier, Applied Cryptography. Second Edition, J. Wiley and Sons, 1996 Mark Ryan, One-way secure hash functions, Computer Security lecture notes, University of Birmingham. Geoff Kuenning and Ethan L. Miller, "Anonymization Techniques for URLs and Filenames," Technical Report UCSC-CRL-03-05, University of California, Santa Cruz, September Xiaoyun Wang, Yiqun Lisa Yin and Hongbo Yu, Finding Collisions in the Full SHA-1, CRYPTO
24 Acknowledgements Thanks to Oleg Kiselev, John Colgrove, Craig Harmer, Chuck Silvers and George Mathew for discussions. Thanks to Marianne Lent and Paul Massiglia for suggestions. Thanks to Ken Zachmann for helping with experiments.
25 Questions
TECHNICAL BRIEF. Primary Storage Compression with Storage Foundation 6.0
TECHNICAL BRIEF Primary Storage Compression with Storage Foundation 6.0 Technical Brief Primary Storage Compression with Storage Foundation 6.0 Contents Introduction... 4 What is Compression?... 4 Differentiators...
More informationFile Systems Management and Examples
File Systems Management and Examples Today! Efficiency, performance, recovery! Examples Next! Distributed systems Disk space management! Once decided to store a file as sequence of blocks What s the size
More informationOn Benchmarking Popular File Systems
On Benchmarking Popular File Systems Matti Vanninen James Z. Wang Department of Computer Science Clemson University, Clemson, SC 2963 Emails: {mvannin, jzwang}@cs.clemson.edu Abstract In recent years,
More informationOBM / FREQUENTLY ASKED QUESTIONS (FAQs) Can you explain the concept briefly on how the software actually works? What is the recommended bandwidth?
Can you explain the concept briefly on how the software actually works? Leading Edge Provider s Online Backup Suite consists of 3 main modules: 1. The client software Online Backup Manager (OBM) 2. The
More informationProject: Simulated Encrypted File System (SEFS)
Project: Simulated Encrypted File System (SEFS) Omar Chowdhury Fall 2015 CS526: Information Security 1 Motivation Traditionally files are stored in the disk in plaintext. If the disk gets stolen by a perpetrator,
More informationEncrypt-FS: A Versatile Cryptographic File System for Linux
Encrypt-FS: A Versatile Cryptographic File System for Linux Abstract Recently, personal sensitive information faces the possibility of unauthorized access or loss of storage devices. Cryptographic technique
More informationViewBox: Integrating Local File System with Cloud Storage Service
ViewBox: Integrating Local File System with Cloud Storage Service FAST 2014 Yupu Zhang +, Chris Dragga +*, Andrea Arpaci-Dusseau +, RemziArpaci-Dusseau + University of Wisconsin-Madison 1 Outline Introduction
More informationFile System Encryption in C#
INTEGRATED FILE-LEVEL CRYPTOGRAPHICAL ACCESS CONTROL Abstract Ryan Seifert ryanseifert@earthlink.net T. Andrew Yang Yang@UHCL.edu Division of Computing and Mathematics University of Houston - Clear Lake,
More informationFlexible Storage Allocation
Flexible Storage Allocation A. L. Narasimha Reddy Department of Electrical and Computer Engineering Texas A & M University Students: Sukwoo Kang (now at IBM Almaden) John Garrison Outline Big Picture Part
More informationDeploying De-Duplication on Ext4 File System
Deploying De-Duplication on Ext4 File System Usha A. Joglekar 1, Bhushan M. Jagtap 2, Koninika B. Patil 3, 1. Asst. Prof., 2, 3 Students Department of Computer Engineering Smt. Kashibai Navale College
More informationZmanda Cloud Backup Frequently Asked Questions
Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What
More informationIM and Presence Disaster Recovery System
Disaster Recovery System, page 1 Access the Disaster Recovery System, page 2 Back up data in the Disaster Recovery System, page 3 Restore scenarios, page 9 Backup and restore history, page 15 Data authentication
More informationDigital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
More informationA Data De-duplication Access Framework for Solid State Drives
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 941-954 (2012) A Data De-duplication Access Framework for Solid State Drives Department of Electronic Engineering National Taiwan University of Science
More informationComputer Architecture. Secure communication and encryption.
Computer Architecture. Secure communication and encryption. Eugeniy E. Mikhailov The College of William & Mary Lecture 28 Eugeniy Mikhailov (W&M) Practical Computing Lecture 28 1 / 13 Computer architecture
More informationStorage Management. in a Hybrid SSD/HDD File system
Project 2 Storage Management Part 2 in a Hybrid SSD/HDD File system Part 1 746, Spring 2011, Greg Ganger and Garth Gibson 1 Project due on April 11 th (11.59 EST) Start early Milestone1: finish part 1
More informationSecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
More informationChapter 11: File System Implementation. Operating System Concepts with Java 8 th Edition
Chapter 11: File System Implementation 11.1 Silberschatz, Galvin and Gagne 2009 Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation
More informationAn Encrypted File System
EncryptFS: An Encrypted File System By: Jorge Ornelas (joor2992) Ulziibayar Otgonbaatar (ulziibay) Otitochi Mbagwu (otitochi) 1 Abstract EncryptFS is an encrypted file system that stores files on an untrusted
More informationSAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
More informationST0-141 Q&A. DEMO Version
Symantec Backup Exec 2012 Technical Assessment Q&A DEMO Version Copyright (c) 2012 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version
More informationTwo Parts. Filesystem Interface. Filesystem design. Interface the user sees. Implementing the interface
File Management Two Parts Filesystem Interface Interface the user sees Organization of the files as seen by the user Operations defined on files Properties that can be read/modified Filesystem design Implementing
More informationFlash-Friendly File System (F2FS)
Flash-Friendly File System (F2FS) Feb 22, 2013 Joo-Young Hwang (jooyoung.hwang@samsung.com) S/W Dev. Team, Memory Business, Samsung Electronics Co., Ltd. Agenda Introduction FTL Device Characteristics
More informationSECURE, AUDITED PROCESSING OF DIGITAL EVIDENCE: FILESYSTEM SUPPORT FOR DIGITAL EVIDENCE BAGS
SECURE, AUDITED PROCESSING OF DIGITAL EVIDENCE: FILESYSTEM SUPPORT FOR DIGITAL EVIDENCE BAGS Golden G. Richard III and Vassil Roussev Department of Computer Science, University of New Orleans New Orleans,
More informationLast modified: September 12, 2013 This manual was updated for TeamDrive Personal Server version 1.1.058
Last modified: September 12, 2013 This manual was updated for TeamDrive Personal Server version 1.1.058 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Installing the TeamDrive Personal Server...
More informationEstablishing a Mechanism for Maintaining File Integrity within the Data Archive
Establishing a Mechanism for Maintaining File Integrity within the Data Archive Thomas C. Stein, Edward A. Guinness, Susan H. Slavney Earth and Planetary Sciences, Washington University, St. Louis, MO,
More informationTuning WebSphere Application Server ND 7.0. Royal Cyber Inc.
Tuning WebSphere Application Server ND 7.0 Royal Cyber Inc. JVM related problems Application server stops responding Server crash Hung process Out of memory condition Performance degradation Check if the
More informationEvaluating parallel file system security
Evaluating parallel file system security 1. Motivation After successful Internet attacks on HPC centers worldwide, there has been a paradigm shift in cluster security strategies. Clusters are no longer
More informationPerformance Characteristics of VMFS and RDM VMware ESX Server 3.0.1
Performance Study Performance Characteristics of and RDM VMware ESX Server 3.0.1 VMware ESX Server offers three choices for managing disk access in a virtual machine VMware Virtual Machine File System
More informationChapter 11: File System Implementation. Operating System Concepts 8 th Edition
Chapter 11: File System Implementation Operating System Concepts 8 th Edition Silberschatz, Galvin and Gagne 2009 Chapter 11: File System Implementation File-System Structure File-System Implementation
More informationMulti-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
More informationData De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication
Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication Table of Contents Introduction... 3 Shortest Possible Backup Window... 3 Instant
More informationLab 2 : Basic File Server. Introduction
Lab 2 : Basic File Server Introduction In this lab, you will start your file system implementation by getting the following FUSE operations to work: CREATE/MKNOD, LOOKUP, and READDIR SETATTR, WRITE and
More informationCHAPTER 17: File Management
CHAPTER 17: File Management The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
More informationConnected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
More informationStrong Security for Distributed File Systems
Strong Security for Distributed File Systems Ethan Miller Darrell Long William Freeman Benjamin Reed University of California, Santa CruzTRW IBM Research Abstract We have developed a scheme to secure networkattached
More informationAIX NFS Client Performance Improvements for Databases on NAS
AIX NFS Client Performance Improvements for Databases on NAS October 20, 2005 Sanjay Gulabani Sr. Performance Engineer Network Appliance, Inc. gulabani@netapp.com Diane Flemming Advisory Software Engineer
More informationOperating Systems. Design and Implementation. Andrew S. Tanenbaum Melanie Rieback Arno Bakker. Vrije Universiteit Amsterdam
Operating Systems Design and Implementation Andrew S. Tanenbaum Melanie Rieback Arno Bakker Vrije Universiteit Amsterdam Operating Systems - Winter 2012 Outline Introduction What is an OS? Concepts Processes
More informationOutline. Operating Systems Design and Implementation. Chap 1 - Overview. What is an OS? 28/10/2014. Introduction
Operating Systems Design and Implementation Andrew S. Tanenbaum Melanie Rieback Arno Bakker Outline Introduction What is an OS? Concepts Processes and Threads Memory Management File Systems Vrije Universiteit
More informationVembu NetworkBackup v3.1.1 GA
Vembu NetworkBackup v3.1.1 GA VEMBU TECHNOLOGIES www.vembu.com TRUSTED BY OVER 25,000 BUSINESSES Vembu NetworkBackup v3.1.1 GA - Release Notes With enhanced features and fixes boosting stability and performance,
More informationMSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
More informationA Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of
More informationCA ARCserve r16.0 - Data Deduplication Frequently Asked Questions
CA ARCserve r16.0 - Data Deduplication Frequently Asked Questions Table of Contents For any backup on to Deduplication device, how many files does ARCserve generate and what do they contain?...4 Can I
More informationSecure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
More informationDOCUMENTATION FILE BACKUP
DOCUMENTATION Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication may be reproduced, transmitted, transcribed,
More informationMaintaining a Microsoft Windows Server 2003 Environment
Maintaining a Microsoft Windows Server 2003 Environment Course number: 2275C Course lenght: 3 days Course Outline Module 1: Preparing to Administer a Server This module explains how to administer a server.
More informationSecureVault Online Backup Service FAQ
SecureVault Online Backup Service FAQ C0110 SecureVault FAQ (EN) - 1 - Rev. 19-Nov-2007 Table of Contents 1. General 4 Q1. Can I exchange the client type between SecureVault PC Backup Manager and SecureVault
More informationOak Ridge National Laboratory Computing and Computational Sciences Directorate. Lustre Crash Dumps And Log Files
Oak Ridge National Laboratory Computing and Computational Sciences Directorate Lustre Crash Dumps And Log Files Jesse Hanley Rick Mohr Sarp Oral Michael Brim Nathan Grodowitz Gregory Koenig Jason Hill
More informationTORNADO ONLINE BACKUP ADMINISTRATOR S GUIDE
TORNADO ONLINE BACKUP ADMINISTRATOR S GUIDE Version 6.5.4.0 CONTENTS Best Practices... 3 Recommended hardware specification... 3 JVM (Java Virtual Machine) memory allocation... 3 Storage size for user
More informationManaging MySQL Scale Through Consolidation
Hello Managing MySQL Scale Through Consolidation Percona Live 04/15/15 Chris Merz, @merzdba DB Systems Architect, SolidFire Enterprise Scale MySQL Challenges Many MySQL instances (10s-100s-1000s) Often
More informationReference Guide WindSpring Data Management Technology (DMT) Solving Today s Storage Optimization Challenges
Reference Guide WindSpring Data Management Technology (DMT) Solving Today s Storage Optimization Challenges September 2011 Table of Contents The Enterprise and Mobile Storage Landscapes... 3 Increased
More informationFile-System Implementation
File-System Implementation 11 CHAPTER In this chapter we discuss various methods for storing information on secondary storage. The basic issues are device directory, free space management, and space allocation
More informationLecture 11. RFS A Network File System for Mobile Devices and the Cloud
Lecture 11 RFS A Network File System for Mobile Devices and the Cloud Yuan Dong, Jinzhan Peng, Dawei Wang, Haiyang Zhu, Fang Wang, Sun C. Chan, Michael P. Mesnier Advanced Operating Systems January 4th,
More informationRed Hat Linux Internals
Red Hat Linux Internals Learn how the Linux kernel functions and start developing modules. Red Hat Linux internals teaches you all the fundamental requirements necessary to understand and start developing
More informationDeployment Scenarios
Deployment Scenarios Sun Cobalt Summary The Sun Cobalt is a network-based appliance for managing a large number of remote servers and for deploying services to these servers. A control station is deployed
More information1 Backup/Restore Files
1 Backup/Restore Files This chapter describes in details how DATABOKS Online Backup Manager backup your files and how you can restore your backup files from DATABOKS Offsite Backup Server using your favorite
More information3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) anthonylai@owasp.org Open Web Application Security Project http://www.owasp.org
More informationEloquence Training What s new in Eloquence B.08.00
Eloquence Training What s new in Eloquence B.08.00 2010 Marxmeier Software AG Rev:100727 Overview Released December 2008 Supported until November 2013 Supports 32-bit and 64-bit platforms HP-UX Itanium
More informationData Integrity: Backups and RAID
Data Integrity: Backups and RAID Introduction Keeping your data safe and reliable TM Backups Types of backups Strategy Tools RAID (Redundant Array of Independent Disks) Types of RAID What type to Use Disk
More informationFile Protection using rsync. Setup guide
File Protection using rsync Setup guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync technology... 3 Terminology... 3 Implementation... 3 3. Rsync data hosts...
More informationOffloading file search operation for performance improvement of smart phones
Offloading file search operation for performance improvement of smart phones Ashutosh Jain mcs112566@cse.iitd.ac.in Vigya Sharma mcs112564@cse.iitd.ac.in Shehbaz Jaffer mcs112578@cse.iitd.ac.in Kolin Paul
More informationMySQL 5.0 vs. Microsoft SQL Server 2005
White Paper Abstract This paper describes the differences between MySQL and Microsoft SQL Server 2000. Revised by Butch Villante, MCSE Page 1 of 6 Database engines are a crucial fixture for businesses
More informationIntroduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
More informationEMC Avamar. Backup Clients User Guide. Version 7.2 302-001-792 REV 02
EMC Avamar Version 7.2 Backup Clients User Guide 302-001-792 REV 02 Copyright 2001-2015 EMC Corporation. All rights reserved. Published in USA. Published August, 2015 EMC believes the information in this
More informationEMC VNXe File Deduplication and Compression
White Paper EMC VNXe File Deduplication and Compression Overview Abstract This white paper describes EMC VNXe File Deduplication and Compression, a VNXe system feature that increases the efficiency with
More informationLEVERAGING FLASH MEMORY in ENTERPRISE STORAGE. Matt Kixmoeller, Pure Storage
LEVERAGING FLASH MEMORY in ENTERPRISE STORAGE Matt Kixmoeller, Pure Storage SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies
More informationManageEngine EventLog Analyzer. Best Practices Document
ManageEngine EventLog Analyzer Best Practices Document Table of Contents System Requirements... 3 Up to 50 hosts... 3 Up to 100 hosts... 3 Up to 200 hosts... 3 Up to 500 hosts... 3 Above 500 hosts... 4
More informationA Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems*
A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* Junho Jang, Saeyoung Han, Sungyong Park, and Jihoon Yang Department of Computer Science and Interdisciplinary Program
More informationSecure information storage
Secure information storage in a private cloud built upon local network resources Student Project for Large Installation Administration Master of Science in System and Network Engineering Universiteit van
More information<Insert Picture Here> Btrfs Filesystem
Btrfs Filesystem Chris Mason Btrfs Goals General purpose filesystem that scales to very large storage Feature focused, providing features other Linux filesystems cannot Administration
More informationThe Google File System
The Google File System By Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung (Presented at SOSP 2003) Introduction Google search engine. Applications process lots of data. Need good file system. Solution:
More informationDualFS: A New Journaling File System for Linux
2007 Linux Storage & Filesystem Workshop February 12-13, 13, 2007, San Jose, CA DualFS: A New Journaling File System for Linux Juan Piernas SDM Project Pacific Northwest National
More information09'Linux Plumbers Conference
09'Linux Plumbers Conference Data de duplication Mingming Cao IBM Linux Technology Center cmm@us.ibm.com 2009 09 25 Current storage challenges Our world is facing data explosion. Data is growing in a amazing
More informationXpresstransfer Online Backup Manager General Technical FAQ
Xpresstransfer Online Backup Manager General Technical FAQ 1. General..... 2 1.1. Can you explain the concept briefly on how the Xpresstransfer software works?... 2 2. Xpresstransfer Online Backup Manager
More informationHyperoo 2 User Guide. Hyperoo 2 User Guide
1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous
More informationMonitoring and Managing a JVM
Monitoring and Managing a JVM Erik Brakkee & Peter van den Berkmortel Overview About Axxerion Challenges and example Troubleshooting Memory management Tooling Best practices Conclusion About Axxerion Axxerion
More informationDigital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics
Digital Forensics Lecture 3 Hard Disk Drive (HDD) Media Forensics Current, Relevant Topics defendants should not use disk-cleaning utilities to wipe portions of their hard drives before turning them over
More informationFossil an archival file server
Fossil an archival file server Russ Cox rsc@mit.edu PDOS Group Meeting January 7, 2003 http://pdos/~rsc/talks History... Cached WORM file server (Quinlan and Thompson): active file system on magnetic disk
More informationRestoring Microsoft SQL Server 7 Master Databases
Restoring Microsoft SQL Server 7 Master Databases A damaged master database is evident by the failure of the SQL Server to start, by segmentation faults or input/output errors or by a report from DBCC.
More informationVeritas NetBackup for Microsoft Exchange Server Administrator s Guide
Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Windows Release 6.5 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Copyright 2002-2007 Symantec Corporation.
More information365 Cloud Storage. Security Brief
365 Cloud Storage Security Brief Overview Surveys reveal time and again that security and data protection concerns are the top barriers to Cloud adoption. At, we take these concerns seriously and have
More informationChapter 4. Operating Systems and File Management
Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup
More informationDistributed Data Storage Based on Web Access and IBP Infrastructure. Faculty of Informatics Masaryk University Brno, The Czech Republic
Distributed Data Storage Based on Web Access and IBP Infrastructure Lukáš Hejtmánek Faculty of Informatics Masaryk University Brno, The Czech Republic Summary New web based distributed data storage infrastructure
More informationSymmetric and Public-key Crypto Due April 14 2015, 11:59PM
CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.
More informationImplementing a Microsoft SQL Server 2005 Database
This class combines two courses into one 5-day class. 2779 (3-day) & 2780 (2-day) Implementing a Microsoft SQL Server 2005 Database Course 2779: Three days; Instructor-Led Introduction This three-day instructor-led
More informationDisaster Recovery Checklist Disaster Recovery Plan for <System One>
Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner
More informationBrightStor ARCserve Backup for Windows
BrightStor ARCserve Backup for Windows Serverless Backup Option Guide r11.5 D01182-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the
More informationNetwork Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
More informationAcronis Backup Deduplication. Technical Whitepaper
Acronis Backup Deduplication Technical Whitepaper Table of Contents Table of Contents Table of Contents... 1 Introduction... 3 Storage Challenges... 4 How Deduplication Helps... 5 How It Works... 6 Deduplication
More informationEnterprise Manager Performance Tips
Enterprise Manager Performance Tips + The tips below are related to common situations customers experience when their Enterprise Manager(s) are not performing consistent with performance goals. If you
More informationPeer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
More informationby New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document
Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.
More informationFermilab Central Web Service Site Owner User Manual. DocDB: CS-doc-5372
Fermilab Central Web Service Site Owner User Manual DocDB: CS-doc-5372 1 Table of Contents DocDB: CS-doc-5372... 1 1. Role Definitions... 3 2. Site Owner Responsibilities... 3 3. Tier1 websites and Tier2
More informationSymantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide
Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup
More informationMobility-Enhanced File Integrity Analyzer For Networked Environments
Mobility-Enhanced File Integrity Analyzer For Networked Environments Guantong Wang, Ronald F. DeMara, Adam J. Rocke Department of Electrical and Computer Engineering University of Central Florida Orlando,
More informationConfiguring Apache Derby for Performance and Durability Olav Sandstå
Configuring Apache Derby for Performance and Durability Olav Sandstå Database Technology Group Sun Microsystems Trondheim, Norway Overview Background > Transactions, Failure Classes, Derby Architecture
More informationtmpfs: A Virtual Memory File System
tmpfs: A Virtual Memory File System Peter Snyder Sun Microsystems Inc. 2550 Garcia Avenue Mountain View, CA 94043 ABSTRACT This paper describes tmpfs, a memory-based file system that uses resources and
More informationInterconnect Efficiency of Tyan PSC T-630 with Microsoft Compute Cluster Server 2003
Interconnect Efficiency of Tyan PSC T-630 with Microsoft Compute Cluster Server 2003 Josef Pelikán Charles University in Prague, KSVI Department, Josef.Pelikan@mff.cuni.cz Abstract 1 Interconnect quality
More informationFall. Forensic Examination of Encrypted Systems Matthew Postinger COSC 374
Fall 2011 Forensic Examination of Encrypted Systems Matthew Postinger COSC 374 Table of Contents Abstract... 3 File System Encryption... 3 Windows EFS... 3 Apple FileVault... 4 Full Disk Encryption...
More informationWindows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline NTFS File System Formats File System Driver Architecture Advanced Features NTFS Driver On-Disk Structure (MFT,...)
More information