Abstract
Digital storage is a key element not only of computing systems, but is now considered an essential component of the infrastructure of any modern organization. This need has co-evolved with the technology that has grown rapidly in recent years to provide low-cost high-capacity storage. At the same time, the storage needs of users have now become more sophisticated and diverse. Some users require very long-term preservation; others need high security; and still others ask for highly-reliable, distributed storage solutions. These needs pose a problem for solution providers in that no single solution seems to meet all needs. Similarly, users must construct services out of disk systems on their own. This paper proposes a way to streamline the marketplace through insurable storage services, a combination of two ideas. The first is to define different categories of storage service; the assumption here is that a refined categorization will better identify particular user needs. The second, and more substantive idea, is to treat digital documents as insurable property. The insurance of storage will provide economic incentives for both producers (storage service providers) and consumers (individuals, organizations) to jointly create a marketplace that provides a diversity of differentially-priced services. For example, insurers can help assess the durability of storage solutions and provide consumers with a quantitative valuation (“It’ll cost you $x per GB to ensure that your documents last 100 years”). Similarly, storage service providers will have incentives to maintain multiple geographically distributed copies, and to continually move the copies onto emerging technologies (“You’ll need to store more copies if you want a higher reliability rating”).
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Appel, A.W., Felten, E.W.: Proof-carrying authentication. In: 6th ACM Conference on Computer and Communications Security (November 1999)
Azagury, et al.: A Two Layered Approach for Securing an object store network. In: 1st International IEEE Security in Storage Workshop (SISW 2002) (2002)
Bearman, D.: Reality and chimeras in the preservation of electronic records. DLIB Magazine 5(4) (1999)
Crespo, A., Garcia-Molina, H.: Cost-driven design for archival repositories. In: Proc. 1st Joint Conference on Digital Libraries (JCDL) (2001)
Halevi, S., Karger, P., Naor, D.: Enforcing Confinement in Distributed Storage and a cryptographic model for access control. IBM Tech Report (2002)
LaMonica, M.: Insurer launches $10 million open-source policy. CNET News (October 2005), http://news.zdnet.com/2100-3513_22-5924112.html
Li, N., Grosof, B., Feigenbaum, J.: Delegation Logic: a logic-based approach to distributed authorization. ACM Trans. on Info. and System Security (February 2003)
Lorie, R.A.: Long-term archiving of digital information. IBM Research Report RJ-10185 (May 2000)
Technical Architecture, Ver. 0.2. National Digital Information Infrastructure and Preservation Program (NDIPP), http://www.digitalpreservation.gov
It’s About Time: Research Challenges in Digital Archiving and Long-term Preservation. NDIPP, http://www.digitalpreservation.gov
Rothenberg, J.: Ensuring the longevity of digital documents. Scientific American 272(1) (January 1995)
Rothenburg, J.: An experiment in using emulation to preserve digital publications. Technical Report, RAND-Europe (April 2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Simha, R., Gopinath, K. (2006). Insurable Storage Services: Creating a Marketplace for Long-Term Document Archival. In: Alexandrov, V.N., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds) Computational Science – ICCS 2006. ICCS 2006. Lecture Notes in Computer Science, vol 3993. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11758532_89
Download citation
DOI: https://doi.org/10.1007/11758532_89
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34383-7
Online ISBN: 978-3-540-34384-4
eBook Packages: Computer ScienceComputer Science (R0)