skip to main content
10.1145/1179559.1179574acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Using free web storage for data backup

Published: 30 October 2006 Publication History

Abstract

Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to equipment. Users and businesses have important information that is difficult to replace, such as financial records and contacts. Reliable backups are crucial because some data cannot be replaced, while recreating other data can be expensive in terms of time and money. We propose two methods which leverage various types of free Web storage to provide simple, reliable, and free backup solutions.The first method is based on the storage of data in the caches of Internet search engines. We have developed CrawlBackup, a tool which prepares and provides the data for Web crawlers and can then restore the data from the Internet even if all the data on the original computer is unavailable. The second method, called MailBackup, stores redundant copies of the important data in the mailboxes of Internet mail services. We have successfully used these backup systems since the middle of 2005. In this paper we discuss and compare these methods, their feasibility of deployment, their security, and their flexibility.

References

[1]
Backup Direct. Value of business data. www.backupdirect.net/about_situation_today.htm, 2004.
[2]
J.M. Bennett, M.A. Bauer, and D. Kinchlea. Characteristics of files in NFS environments. ACM SIGSMALL/PC Notes, 18(3-4):18--25, 1992.
[3]
A. Chervenak, V. Vellanki, and Z. Kurmas. Protecting File Systems: A survey of backup techniques. In Proc. of Joint IEEE and NASA Mass Storage Conf., March 1998.
[4]
R. Dad. How the Google Cache can Save Your A¿. Smart Money Daily, December 2005. www.smartmoneydaily.com/Business/Howthe-Google-Cache-can-Save-You.aspx.
[5]
N. Haller. The S/KEY One-Time password system. Tech. Rep. RFC 1760, Network Working Group, Feb 1995.
[6]
R. Hasan, S. Myagmar, A. Lee, and W. Yurcik. Toward a Threat Model for Storage Systems. In Proc. of the 2005 ACM Workshop on Storage Security and Survivability (StorageSS 2005), pp. 94--102, FairFax, VA, November 2005. ACM.
[7]
R. Hasan, W. Yurcik, and S. Myagmar. The Evolution of Storage Service Providers: Techniques and Challenges to Outsourcing Storage. In Proc. of the 2005 ACM Workshop on Storage Security and Survivability (StorageSS 2005), pp. 1--8, FairFax, VA, November 2005
[8]
R. Jones. Gmail Filesystem. http://richard.jones.name/google-hacks/gmail-filesystem/gmail-filesystem.html.
[9]
M. Kane. Going for a GDrive with google. CNET News, 7, March 2006. http://cnet.com/2061-11199_3-6046686.html.
[10]
W. Koch. The GNU privacy guard. gnupg.org, Aug 2003.
[11]
N. Leghari. GmailSync - Free automated backup solution using Gmail. http://weblogs.asp.net/nleghari/articles/gmailbackup.aspx.
[12]
F. McCown. Warrick - Tool for Reconstructing a Website. www.cs.odu.edu/¿fmccown/research/lazy/warrick.html.
[13]
E. Riedel, M. Kallahalla, and R. Swaminathan. A Framework for Evaluating Storage System Security. In Proc. of the First USENIX Conf. on File and Storage Technologies, pp. 15--30, Monterey, CA, January 2002.
[14]
D. Roselli, J.R. Lorch, and T.E. Anderson. A Comparison of File System Workloads. In Proc. of the Annual USENIX Technical Conf., pp. 41--54, San Diego, CA, June 2000.
[15]
D.S. Santry, M.J. Feeley, N.C. Hutchinson, A.C. Veitch, R.W. Carton, and J. Ofir. Deciding When to Forget in the Elephant File System. In Proc. of the 17th ACM Symposium on Operating Systems Principles, pp. 110--123, Charleston, SC, December 1999
[16]
Andrew S. Tanenbaum, Jorrit N. Herder, and Herbert Bos. File size distribution on UNIX systems: then and now. SIGOPS Operating Systems Review, 40(1):100--104, 2006.
[17]
G. Trapani. Automatically email yourself file backups. www.lifehacker.com/software/email/geek-to-live-automatically-mail-yourself-file-backups-168156.php.
[18]
B. Viksoe. GMail Drive shell extension. www.viksoe.dk/code/gmail.htm.
[19]
P. Wayner. Disappearing Cryptography: Being and Nothingness on the Net. Morgan Kaufmann, April 1996.
[20]
E. Zadok, J. Osborn, A. Shater, C.P. Wright, K. Muniswamy-Reddy, and J. Nieh. Reducing Storage Management Costs via Informed User-Based Policies. In Proc. of the 12th NASA Goddard, 21st IEEE Conf. on Mass Storage Systems and Technologies, pp. 193--197, College Park, MD, April 2004

Cited By

View all
  • (2014)Security audit of data flows across enterprise systems and networksThe 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)10.1109/ICITST.2014.7038813(240-247)Online publication date: Dec-2014
  • (2013)Extending HTML5 local storage to save more data; efficiently and in more structured wayEighth International Conference on Digital Information Management (ICDIM 2013)10.1109/ICDIM.2013.6693990(337-340)Online publication date: Sep-2013
  • (2013)Cloud-as-a-GiftProceedings of the 2013 IEEE Sixth International Conference on Cloud Computing10.1109/CLOUD.2013.47(621-628)Online publication date: 28-Jun-2013
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
StorageSS '06: Proceedings of the second ACM workshop on Storage security and survivability
October 2006
94 pages
ISBN:1595935525
DOI:10.1145/1179559
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. backup
  2. web services

Qualifiers

  • Article

Conference

CCS06
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2014)Security audit of data flows across enterprise systems and networksThe 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)10.1109/ICITST.2014.7038813(240-247)Online publication date: Dec-2014
  • (2013)Extending HTML5 local storage to save more data; efficiently and in more structured wayEighth International Conference on Digital Information Management (ICDIM 2013)10.1109/ICDIM.2013.6693990(337-340)Online publication date: Sep-2013
  • (2013)Cloud-as-a-GiftProceedings of the 2013 IEEE Sixth International Conference on Cloud Computing10.1109/CLOUD.2013.47(621-628)Online publication date: 28-Jun-2013
  • (2011)EMFSProceedings of the 2011 IEEE Sixth International Conference on Networking, Architecture, and Storage10.1109/NAS.2011.55(248-257)Online publication date: 28-Jul-2011
  • (2009)De-duplication-based archival storage systemProceedings of the 3rd International Conference on Communications and information technology10.5555/1736135.1736182(273-277)Online publication date: 29-Dec-2009
  • (2008)Recovering a website's server components from the web infrastructureProceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries10.1145/1378889.1378911(124-133)Online publication date: 16-Jun-2008
  • (2008)A seamless and reliable distributed network file system utilizing webspace2008 10th International Symposium on Web Site Evolution10.1109/WSE.2008.4655397(65-68)Online publication date: Oct-2008
  • (2008)Efficient index lookup for De-duplication backup system2008 IEEE International Symposium on Modeling, Analysis and Simulation of Computers and Telecommunication Systems10.1109/MASCOT.2008.4770594(1-3)Online publication date: Sep-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media