Storage (and the appropriate manipulation capabilities) should only be accessible and visible to users with the appropriate permissions
Users should be notified if their data has been tampered with or altered either intentionally or unintentionally
Malicious users should not be allowed to access or tamper with other people’s storage. If possible, the system should be able to catch malicious users.
User’s data should be physically deleted at the appropriate time. That is, it should not be present past its intended life-time
Tracking unauthorized copying or access control delegations is also an important security concern.
Security has been a key computer science topic for many...
- 1.Riedel E., Kallahalla M., and Swaminathan R. A framework for evaluating storage system security. In Proc. 1st USENIX Conf. on File and Storage Technologies, 2002.Google Scholar