Norton Zone: Symantec's Secure Cloud Storage System

Walter Bogorad, Scott Schneider, Haibin Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Cloud storage services are the way of the future, if not the present, but broad adoption is limited by a stark trade-off between privacy and functionality. Many popular cloud services provide search capabilities, but make only nominal efforts to keep user data fully private. Alternatives that search private user data on an untrusted server sacrifice functionality and/or scalability. We describe Norton Zone, Symantec's secure and scalable public storage system based on our valet security model. Whereas most commercial cloud storage systems secure user data with access control and legal mechanisms, Zone's cryptographic techniques provide proven privacy guarantees. This gives users an extra layer of security without compromising functionality. Zone's performance is comparable to unencrypted cloud storage systems that support search and sharing. We report on the design of Zone and the lessons learned in developing and deploying it in commercial, distributed datacenters scalable to millions of users.

Original languageEnglish
Title of host publicationProceedings - 2016 IEEE 35th International Symposium on Reliable Distributed Systems, SRDS 2016
PublisherIEEE Computer Society
Pages81-90
Number of pages10
ISBN (Electronic)9781509035137
DOIs
Publication statusPublished - 21 Dec 2016
Externally publishedYes
Event35th IEEE International Symposium on Reliable Distributed Systems, SRDS 2016 - Budapest, Hungary
Duration: 26 Sept 201629 Sept 2016

Publication series

NameProceedings of the IEEE Symposium on Reliable Distributed Systems
ISSN (Print)1060-9857

Conference

Conference35th IEEE International Symposium on Reliable Distributed Systems, SRDS 2016
Country/TerritoryHungary
CityBudapest
Period26/09/1629/09/16

Fingerprint

Dive into the research topics of 'Norton Zone: Symantec's Secure Cloud Storage System'. Together they form a unique fingerprint.

Cite this