Embedded Security for Network-Attached Storage (CMU-CS-99-154)
نویسندگان
چکیده
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to the multi-host Internet-based systems of Network-attached Secure Disks (NASD), protecting the integrity of data transfers between client and storage becomes essential. However, it is also computationally expensive and can impose significant performance penalties on storage systems. This paper explores several techniques that can protect the communications integrity of storage requests and data transfers, imposing very little performance penalty and significantly reducing the amount of required cryptography. Central to this work is an alternative cryptographic approach, called “Hash and MAC”, that reduces the cost of protecting the integrity of read traffic in storage devices that are unable to generate a message authentication code at full data transfers rates. Hash and MAC does this by precomputing security information, using and reusing the precomputed information on subsequent read requests. We also present a refined “Hash and MAC” approach that uses incremental hash functions to improve the performance of small read and write operations as well as non-block-aligned operations. Embedded Security for Network-Attached Storage Howard Gobioff1, David Nagle2, Garth Gibson1 June 1999 CMU-CS-99-154 School of Computer Science Carnegie Mellon University Pittsburgh, Pennsylvania 15213-3890 Contact: David Nagle ([email protected]) Office: 412-268-3898 Fax: 412-268-6353 1. School of Computer Science, can be reached via email at {hgobioff,garth}@cs.cmu.edu 2. Department of Electrical and Computer Engineering, can be reached via email at [email protected] This research is sponsored by DARPA/ITO through DARPA Order D306, and issued by Indian Head Division, NSWC under contract N00174-96-0002. Additional support was provided by the member companies of the Parallel Data Consortium, including: Hewlett-Packard Laboratories, Hitachi, IBM, Intel, Quantum, Seagate Technology, Siemens, Storage Technology, Wind River Systems, 3Com Corporation, Compaq, Data General/Clariion, and LSI Logic. ACM Computing Reviews
منابع مشابه
Embedded Security for Network-Attached Storage
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to the multi-host Internet-based systems of Network-attached Secure Disks (NASD), protecting the integrity of data transfers between client and storage becomes essential. However, it is also computationally expensive and can impose significant performance penalties on storage systems. This paper expl...
متن کاملA Case for Network-Attached Secure Disks (CMU-CS-96-142)
By providing direct data transfer between storage and client, network-attached storage devices have the potential to improve scalability (by removing the server as a bottleneck) and performance (through network striping and shorter data paths). Realizing the technology’s full potential requires careful consideration across a wide range of file system, networking and security issues. To address ...
متن کاملEnabling Dynamic Security Management of via Device-Embedded Security (CMU-CS-00-174)
This report contains the technical content of a recent funding proposal. In it, we propose a new approach to network security in which each individual device erects its own security perimeter and defends its own critical resources. Together with conventional border defenses (e.g., firewalls and OS kernels), such self-securing devices could provide a flexible infrastructure for dynamic preventio...
متن کاملActive Disks: A Scenario For Cost-effective Massive Data Processing
By providing direct data transfer between storage and client, networkattached storage devices have the potential to improve scalability for existing distributed file systems (by removing the server as a bottleneck) and bandwidth for parallel and distributed file systems (through network striping and more efficient data paths). Together, these advantages influence a large enough fraction of the ...
متن کاملIntegrity and Performance in Network Attached Storage (CMU-CS-98-182)
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically integrity, by focusing on integrating security into network storage system. Emphasizing the cost-constrained environment of storage, we examine how current software-based cryptography cannot support storage’s Gigabit/sec t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015