As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic storage …
C Yang, X Chen, Y Xiang - Journal of Network and Computer Applications, 2018 - Elsevier
With the rapid development of cloud storage, more and more data owners store their data on the remote cloud, that can reduce data owners' overhead because the cloud server …
Over the last twenty years the interfaces for accessing persistent storage within a computer system have remained essentially unchanged. Simply put, seek, read and write have …
J Reardon, D Basin, S Capkun - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
Secure data deletion is the task of deleting data irrecoverably from a physical medium. In the digital world, data is not securely deleted by default; instead, many approaches add secure …
K Veeraraghavan, D Lee, B Wester, J Ouyang… - ACM Transactions on …, 2012 - dl.acm.org
Deterministic replay systems record and reproduce the execution of a hardware or software system. In contrast to replaying execution on uniprocessors, deterministic replay on …
We examine the write endurance of USB flash drives using a range of approaches: chip- level measurements, reverse engineering, timing analysis, whole-device endurance testing …
The vast majority of state produced by a typical computer is generated, consumed, then lost forever. We argue that a computer system should instead provide the ability to recall any …
Parallax is a distributed storage system that uses virtualization to provide storage facilities specifically for virtual environments. The system employs a novel architecture in which …
The high replication cost of Byzantine fault-tolerance (BFT) methods has been a major barrier to their widespread adoption in commercial distributed applications. We present ZZ, a …