Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Storage Security

  • Kaladhar VorugantiEmail author
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_523


Access control; Authentication; CAS; Compliance; Data corruption; LUN masking; On-disk security; On-wire security; Port binding; Provenance; Watermarking; WORM; Zoning


The definition of storage security has many facets, and some of the key requirements are:

  • Storage (and the appropriate manipulation capabilities) should only be accessible and visible to users with the appropriate permissions

  • Users should be notified if their data has been tampered with or altered either intentionally or unintentionally

  • Malicious users should not be allowed to access or tamper with other people’s storage. If possible, the system should be able to catch malicious users.

  • User’s data should be physically deleted at the appropriate time. That is, it should not be present past its intended life-time

  • Tracking unauthorized copying or access control delegations is also an important security concern.

Historical Background

Security has been a key computer science topic for many decades....

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Riedel E, Kallahalla M, Swaminathan R. A framework for evaluating storage system security. In: Proceedings of the 1st USENIX Conference on File and Storage Technologies; 2002.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Advanced Development GroupNetwork ApplianceSunnyvaleUSA

Section editors and affiliations

  • Kaladhar Voruganti
    • 1
  1. 1.Advanced Development GroupNetwork ApplianceSunnyvaleUSA