Abstract
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention.
Highlights
In recent years, information has become the greatest asset of many enterprises
Three different times were measured: dispatch time, which is the elapsed time during custody unit preparation and check-out; exchange time, which is the elapsed time during the visit and storage time, which is the elapsed time of the custody unit storage at the vault
The vertical axis shows the average dispatch, exchange and storage times obtained in the experiments, while the horizontal axis represents the number of custody units involved in the operations
Summary
Information has become the greatest asset of many enterprises. In a world of threats, this should make information security one of the highest priorities in corporate environments. The intent of the process is to mitigate most of the aforementioned physical risks, it in turn raises new security concerns derived from the transfer of sensitive data across the network and the subsequent loss of control over them once they leave the organization network perimeter This possibility, along with availability and cost issues, makes electronic vaulting an unsuitable solution for many organizations, which must rely on classical off-site data storage services. They must cope with the aforementioned risks by employing additional mechanisms to enhance data security in the process.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.