Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1103780.1103782acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

The evolution of storage service providers: techniques and challenges to outsourcing storage

Published: 11 November 2005 Publication History

Abstract

As enterprise storage needs grow, it is challenging to manage storage systems. The costs of locally managing, supporting, and maintaining resilience in storage systems has skyrocketed. Also, companies must comply with a growing number of federal and state legislations mandating secure handling of electronic information.In this context, outsourcing of storage to utility-model based service providers has emerged as a popular and often cost-effective option. However, this raises issues related to data safety and storage techniques. In this paper, we discuss the business model and evolution of service-oriented companies known as Storage Service Providers and examine the challenges organizations should consider when outsourcing their storage management. To our knowledge, this is the first work to study the SSP model from both technical and business viewpoints. Lastly, we present two case studies, one of a failed SSP and the other of a successful market leader.

References

[1]
General Rules and Regulations Promulgated under the Securities Exchange Act of 1934. Federal Trade Commission, http://www.mfainfo.org/washington/1934. pdf.
[2]
Gramm-Leach-Bliley Act of 1999. Federal Trade Commission, http://www.ftc.gov/privacy/glbact/.
[3]
The Health Insurance Portability and Account ability Act of 1996(HIPAA). Centers for Medicare & Medicaid Services, http://www.cms.hhs.gov/hipaa/,1996.
[4]
Application note: Expandings to rage service provider connectivity solutions. LuxN/SanValley, 2000.
[5]
Storage networks up234%. CNNMoney, June 2000.
[6]
The emerging storage security challenge. Somix Technologies Inc., White Paper, August 2001.
[7]
SSP application brief. Falcon Stor White Paper, May 2001.
[8]
California Database Breach Act(SB1386). California Senate, http://info.sen.ca.gov/pub/01-02/bill/sen/sb1351-1400/sb1386bill20020926chaptered. html,2002.
[9]
Sarbanes-Oxley Act of 2002. U. S. Securities and Exchange Commission, http://www. sarbanes-oxley-forum. com/,2002.
[10]
Managed storage services: Improving performance without increasing capitalexpense. IBM Global Services, June 2004.
[11]
Storage: Thinking outside the box. iSCSI Storage,2004.
[12]
IBM leads in storage services. DSstar News, July 2005.
[13]
D. Allen. Storage service providers: By any other name. Network Magazine, May 2002.
[14]
G. Blackwell. Storage service providers play. http://isp-planet. com/services/2001/ssp. html.
[15]
F. Brick. Massexodus: The movement of data off site. Disaster Recovery Journal, 17(3), 2004.
[16]
P. Curran and B. Youngren. Making the case for ssps. Infostor Magazine, April 2001.
[17]
P. D. CurranandB. D. Youngren. What's ahead for storage service providers? Infostor, May 2002.
[18]
R. Dufrene. Data replication over the wan-connectivity. Computer Technology Review, October 2003.
[19]
L. Erlanger. Storage as universal data tone: New technologies provide global access to your storage systems and your data. Internet World, August 2001.
[20]
C. Forelle. Data-farm flop points to flaws in new tech fad. The Wall Street Journal, August 2003.
[21]
L. Freed. Outsourced network storage. PC Magazine, April 2001.
[22]
J. Gray. Storage service providers? Panel talk at the 27th International Conference on Very Large Data Bases(VLDB), 2001.
[23]
B. Hoard. What is behind the move to storage networks? Storage Networking World Online Magazine, April 2001.
[24]
R. Kerns. The economics of a storage strategy. Computer World, October 2001.
[25]
R. Kerns. Storage service provider revival? Computer world, March 2005.
[26]
Y. Kim. Security and accounting for storage service provider. In Intelligent Storage Workshop, University of Minnesota, 2005.
[27]
J. F. Kovar. Storage on demand. Storage Pipeline Magazine, November 2003.
[28]
J. F. Kovar. Storage networks files plans to liquidate. CRN, July 2003.
[29]
J. Li, M. Krohn, D. Mazires, and D. Shasha. Secure untrusted datarepository(sundr). In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI), pages 121--136, San Francisco, CA, USA, December 2004.
[30]
J. Madden. Takemydata. please! storage service providers offer viable alternative for businesses. DM Review Magazine, May 2001.
[31]
J. Maitland. SSPs: rip. Byte and Switch, January 2002.
[32]
G. Nagle. The cost of owning and storing data. http://www.storagesearch.com/costdata.html, July 1999.
[33]
W. T. Ng and B. K. Hillyer. Obtaining high performance for storage outsourcing. In ACM SIGMETRICS, June 2001.
[34]
B. Ozden, E. Gabber, B. Hillyer, W. T. Ng, and E. Shriver. Storage service providers: a solution for storage management?In Proceedings of the 27th International Conference on Very Large Data Bases (VLDB), 2001.
[35]
S. Schmelling. This year's storage model. The Net Economy, April 2002.
[36]
Z. Shess. Storage outsourcing provider opens shop. Infostor, May 1999.
[37]
D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In SP'00: Proceedings of the 2000 IEEE Symposium on Security and Privacy, page 44, Washington, DC, USA, 2000. IEEE Computer Society.
[38]
J. W. Toigo. The ins and outs of storage management. Network Connections, 2001.
[39]
D. Vellante. In search of storage ROI. SMS, 7(4),2002.
[40]
C. Voo. The case for utility computing. Tech Target, February 2005.
[41]
C. Willis. Rampchamps. Forbes ASAP, February 2001.
[42]
T. Witkowski. Storage networks pays $114 m price for soft ware shift. Biz Journals, February 2002.

Cited By

View all
  • (2020)On the Security of a Certificateless Public Verification Scheme for Cloud-Based Cyber-Physical-Social SystemsSecurity and Privacy in Social Networks and Big Data10.1007/978-981-15-9031-3_34(387-394)Online publication date: 22-Sep-2020
  • (2018)Digital Continuity Guarantee of Electronic Record Based on Data Usability in Big Data EnvironmentCloud Computing and Security10.1007/978-3-030-00006-6_42(456-466)Online publication date: 1-Nov-2018
  • (2016)Research on MapReduce-based cloud storage batch auditing2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)10.1109/ICIEA.2016.7603788(1317-1322)Online publication date: Jun-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
StorageSS '05: Proceedings of the 2005 ACM workshop on Storage security and survivability
November 2005
150 pages
ISBN:159593233X
DOI:10.1145/1103780
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 November 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. data protection
  2. outsourcing
  3. storage service provider

Qualifiers

  • Article

Conference

CCS05
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)1
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2020)On the Security of a Certificateless Public Verification Scheme for Cloud-Based Cyber-Physical-Social SystemsSecurity and Privacy in Social Networks and Big Data10.1007/978-981-15-9031-3_34(387-394)Online publication date: 22-Sep-2020
  • (2018)Digital Continuity Guarantee of Electronic Record Based on Data Usability in Big Data EnvironmentCloud Computing and Security10.1007/978-3-030-00006-6_42(456-466)Online publication date: 1-Nov-2018
  • (2016)Research on MapReduce-based cloud storage batch auditing2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)10.1109/ICIEA.2016.7603788(1317-1322)Online publication date: Jun-2016
  • (2011)The Enterprise Cloud Computing ParadigmCloud Computing10.1002/9780470940105.ch4(97-120)Online publication date: 3-Jan-2011
  • (2010)Document provenance in the cloudProceedings of the 16th EUNICE/IFIP WG 6.6 conference on Networked services and applications: engineering, control and management10.5555/1875907.1875922(107-117)Online publication date: 28-Jun-2010
  • (2010)Chit-based remote storage2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)10.1109/PERCOMW.2010.5470593(517-521)Online publication date: Mar-2010
  • (2010)Document Provenance in the Cloud: Constraints and ChallengesNetworked Services and Applications - Engineering, Control and Management10.1007/978-3-642-13971-0_11(107-117)Online publication date: 2010
  • (2009)Storage administrationProceedings of the Symposium on Computer Human Interaction for the Management of Information Technology10.1145/1641587.1641595(56-59)Online publication date: 7-Nov-2009
  • (2008)Towards tamper-evident storage on patterned mediaProceedings of the 6th USENIX Conference on File and Storage Technologies10.5555/1364813.1364832(1-14)Online publication date: 26-Feb-2008
  • (2008)SharoesProceedings of the 2008 IEEE 24th International Conference on Data Engineering10.1109/ICDE.2008.4497508(993-1002)Online publication date: 7-Apr-2008
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media