| Literature DB >> 22163638 |
Miguel A Lopez-Carmona1, Ivan Marsa-Maestre, Enrique de la Hoz, Juan R Velasco.
Abstract
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.Entities:
Keywords: Off-site data storage; RFID; security controls
Mesh:
Year: 2010 PMID: 22163638 PMCID: PMC3231196 DOI: 10.3390/s100908010
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.Custody unit retrieval use case.
Figure 2.Custody unit delivery process.
Figure 3.SECUR system architecture.
Figure 4.Gate Subsystem deployed in a vault.
Security mechanisms implemented in the different security tiers.
| 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | |
|---|---|---|---|---|---|---|---|---|---|---|---|
| TLS secure connections, username/password, server-side certs., subsystem certs. | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||
| Real-time custody unit tracking, browser client-side certificates | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||
| Plain RFID identification | ✓ | ✓ | |||||||||
| Password protected RFID identification | ✓ | ||||||||||
| Encrypted RFID identification | ✓ | ✓ | ✓ | ||||||||
| Vault space division, segregation of duties | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |
| PIN-based vault access control | ✓ | ✓ | ✓ | ✓ | |||||||
| RFID-based vault access control, RFID-based CU check-in and check-out at vault | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||
| RFID-based CU check-in and check-out at the transport vans | ✓ | ✓ | |||||||||
| Biometric vault access control | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||
| Continuous RFID inventory | ✓ | ||||||||||
| CU and employee authentication at every operation | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||
| Retrieval/delivery receipts | ✓ | ||||||||||
| PSS-generated receipts | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||
Security risks mitigated in the different security tiers.
| 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | |
|---|---|---|---|---|---|---|---|---|---|---|---|
| Impersonation of OSSP and CE employees | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||
| OSSP and CE employee credential forgery | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||
| Custody unit ID tag forgeries | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||
| Delivery or retrieval repudiation | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |
| Delivery or retrieval to wrong customers | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||
| CU exposure to unauthorized customers | ✓ | ✓ | |||||||||
| Unauthorized CUs leaving the vault | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||
| Unauthorized access to the vault | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |
| Theft / oversight of credentials for vault access | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||
| Custody unit operations by unauthorized personnel | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||
| Mistaken/malicious CU operations by authorized pers. | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||
| Undue CU manipulations within the vault | ✓ | ||||||||||
Figure 5.Time results for the Tier 1 and Tier 5 implementations.
Error and failure rate results.
| 1 | 0 | 0 | 0 | 0 |
| 5 | 0 | 0 | 0 | 0 |
| 10 | 0 | 0 | 0 | 0 |
| 20 | 0.01 | 0.002 | 0 | 0 |
| 30 | 0.02 | 0.005 | 0.005 | 0 |
| 50 | 0.05 | 0.01 | 0.01 | 0.0001 |
Results for the attack experiments.
| 1 | 0 | 0 | 1 | 0 | 0 | 0 |
| 5 | 0 | 0 | 1 | 0 | 0 | 0 |
| 10 | 0 | 0 | 1 | 0 | 0.12 | 0 |
| 20 | 0.004 | 0 | 1 | 0 | 0.26 | 0 |
| 30 | 0.007 | 0 | 1 | 0 | 1 | 0 |
| 50 | 0.02 | 0.0002 | 1 | 0.0002 | 1 | 0.0003 |