Abstract

Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention.

Highlights

  • In recent years, information has become the greatest asset of many enterprises

  • Three different times were measured: dispatch time, which is the elapsed time during custody unit preparation and check-out; exchange time, which is the elapsed time during the visit and storage time, which is the elapsed time of the custody unit storage at the vault

  • The vertical axis shows the average dispatch, exchange and storage times obtained in the experiments, while the horizontal axis represents the number of custody units involved in the operations

Read more

Summary

Introduction

Information has become the greatest asset of many enterprises. In a world of threats, this should make information security one of the highest priorities in corporate environments. The intent of the process is to mitigate most of the aforementioned physical risks, it in turn raises new security concerns derived from the transfer of sensitive data across the network and the subsequent loss of control over them once they leave the organization network perimeter This possibility, along with availability and cost issues, makes electronic vaulting an unsuitable solution for many organizations, which must rely on classical off-site data storage services. They must cope with the aforementioned risks by employing additional mechanisms to enhance data security in the process.

The Off-Site Data Storage Process for Business Continuity Management
Off-site data storage service use cases
Key processes and security concerns
System architecture
Security mechanisms
Communication security controls
RFID identification controls
Physical access controls
Process controls
Security tiers
Performance Evaluation
Experimental settings
Experimental results
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.