Virtualization: Issues, security threats, and solutions

M Pearce, S Zeadally, R Hunt - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Although system virtualization is not a new paradigm, the way in which it is used in modern
system architectures provides a powerful platform for system building, the advantages of …

A survey of confidential data storage and deletion methods

SM Diesburg, AIA Wang - ACM Computing Surveys (CSUR), 2010 - dl.acm.org
As the amount of digital data grows, so does the theft of sensitive data through the loss or
misplacement of laptops, thumb drives, external hard drives, and other electronic storage …

Blockchain-based publicly verifiable data deletion scheme for cloud storage

C Yang, X Chen, Y Xiang - Journal of Network and Computer Applications, 2018 - Elsevier
With the rapid development of cloud storage, more and more data owners store their data on
the remote cloud, that can reduce data owners' overhead because the cloud server …

Beyond block I/O: Rethinking traditional storage primitives

X Ouyang, D Nellans, R Wipfel, D Flynn… - 2011 IEEE 17th …, 2011 - ieeexplore.ieee.org
Over the last twenty years the interfaces for accessing persistent storage within a computer
system have remained essentially unchanged. Simply put, seek, read and write have …

Sok: Secure data deletion

J Reardon, D Basin, S Capkun - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
Secure data deletion is the task of deleting data irrecoverably from a physical medium. In the
digital world, data is not securely deleted by default; instead, many approaches add secure …

DoublePlay: Parallelizing sequential logging and replay

K Veeraraghavan, D Lee, B Wester, J Ouyang… - ACM Transactions on …, 2012 - dl.acm.org
Deterministic replay systems record and reproduce the execution of a hardware or software
system. In contrast to replaying execution on uniprocessors, deterministic replay on …

[PDF][PDF] Write Endurance in Flash Drives: Measurements and Analysis.

S Boboila, P Desnoyers - FAST, 2010 - usenix.org
We examine the write endurance of USB flash drives using a range of approaches: chip-
level measurements, reverse engineering, timing analysis, whole-device endurance testing …

Eidetic systems

D Devecsery, M Chow, X Dou, J Flinn… - 11th USENIX Symposium …, 2014 - usenix.org
The vast majority of state produced by a typical computer is generated, consumed, then lost
forever. We argue that a computer system should instead provide the ability to recall any …

Parallax: virtual disks for virtual machines

DT Meyer, G Aggarwal, B Cully, G Lefebvre… - Proceedings of the 3rd …, 2008 - dl.acm.org
Parallax is a distributed storage system that uses virtualization to provide storage facilities
specifically for virtual environments. The system employs a novel architecture in which …

ZZ and the art of practical BFT execution

T Wood, R Singh, A Venkataramani, P Shenoy… - Proceedings of the sixth …, 2011 - dl.acm.org
The high replication cost of Byzantine fault-tolerance (BFT) methods has been a major
barrier to their widespread adoption in commercial distributed applications. We present ZZ, a …