Skip to main content

A Security Scheme for United Storage Network

  • Conference paper
  • 544 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3252))

Abstract

USN realizes the integration of SAN and NAS with IP network, but it brings new security consideration such as user authorization, data privacy and integrity. A USN model based on the third party transfer protocol is suggested to realize the security scheme. This security scheme has the following characteristics: A key distribution scheme is used to create credentials for users in order to reduce authorization server performance penalty; Using HMAC authenticates users requests so as to minimize computation overhead; Performing encryption/decryption of data at clients and storing data checksums on the storage will minimize the storage performance penalty; The lockbox is used to integrate keys in order to minimize the sum of keys need managed by authorization server. Experiments show that it takes less than 10% performance overhead to realize the security scheme for USN comparing the baseline USN.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Vorugaanti, K., Sarkar, P.: An Analysis of Three Gigabit Networking Protocols for Storage Area Networks. IEEE, Los Alamitos (2001)

    Google Scholar 

  2. Baumert, C.: Secuing IP Storage Networks. Cylink Corporation, USA (October 2002)

    Google Scholar 

  3. Gibson, G.A., van Meter, R.: Network Attached Storage Architecture. Communication of Theacm (November 2000)

    Google Scholar 

  4. Zhiheny, W., Yingcai, B.: A New Scheme of Integrating NAS with SAN. Journal of Shanghai Jiaotong University E-8(1) (2003)

    Google Scholar 

  5. Yingwu, Z.Y.H.: SNARE: A Strong Security Scheme for Network-Attached Storage. In: The 2nd International Symposium on Reliable Distributed Systems, SRDS 2003 (2003)

    Google Scholar 

  6. Reidel, E., Kallahalla, M., Swaminathan, R.: A framework for evaluating storage systems security. In: The 1st conference on File and Storage Technologies (FAST) (January 2002)

    Google Scholar 

  7. Miller, E., Long, D., Freeman, W., Reed, B.: Strong Security for Network-Attached Storage. In: The FAST 2002 Conference on File and Storage Technologies (January 2002)

    Google Scholar 

  8. Reed, B.C., Chron, E.G., Burns, R.l.C., Long, D.E.: Authenticating Network-Attached Storage. IEEE Micro 20(1), 49–57 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Luo, Y., Xie, C., Zhang, C. (2004). A Security Scheme for United Storage Network. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds) Grid and Cooperative Computing - GCC 2004 Workshops. GCC 2004. Lecture Notes in Computer Science, vol 3252. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30207-0_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30207-0_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23578-1

  • Online ISBN: 978-3-540-30207-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics