Authenticating Network-Attached Storage
نویسندگان
چکیده
0272-1732/00/$10.00 2000 IEEE The need to access anything from anywhere has increased the role of distributed file servers in computing. Distributed file systems provide local file system semantics for access to remote storage. This allows network clients to incorporate the remote storage into their local file system. File semantics are well understood by users and applications, making distributed file servers a convenient tool in developing distributed applications. As the role played by distributed file systems expands, problems with their design become increasingly evident. Faster clients, high-bandwidth connections, and larger drive capacities increase the demand on file servers. Although it would seem that the I/O capacity of the system storage devices would limit network file server performance, in actuality, file servers frequently are CPU bound. Riedel and Gibson discovered that, even with low overall CPU utilization, burst loads were sufficiently intense to overuse the server. In addition to the performance problems of distributed network file systems, security also presents a problem. Applications that rely on distributed file systems should not be compromised by security weaknesses of the file systems on which they are built. Local file systems have a single kernel that restricts access to file data, but because a distributed file system involves multiple servers and clients, it cannot rely on a single kernel to restrict access. The security risk is even greater since the network that connects servers and clients may also pose a threat. The authenticated network-attached disks we present address these problems by providing an architecture based on one-way hash functions that make available mutual authentication of the network disks and the clients. This architecture obviates the need for more performance-intensive authentication methods such as public-key encryption and Kerberos, but does not preclude their use. The authentication protocol used by the network storage is very simple and flexible, and allows keys to be created and managed using existing authentication systems.
منابع مشابه
IEEE Std 802.1X-2001, IEEE Standard for Local and metropolitan area networks---Port-Based Network Access Control
Port-based network access control makes use of the physical access characteristics of IEEE 802 Local Area Networks (LAN) infrastructures in order to provide a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics, and of preventing access to that port in cases in which the authentication and authorization process fails.
متن کاملAn Analytic Model of Hierarchical Mass Storage Systemswith Network - Attached Storage
Network attached storage devices improve I/O performance by separating control and data paths and eliminating host intervention during data transfer. Devices are attached to a high speed network for data transfer and to a slower network for control messages. Hierarchical mass storage systems use disks to cache the most recently used les and tapes (robotic and manually mounted) to store the bulk...
متن کاملKURMA: Geo-Distributed Secure Middleware for Cloud-Backed Network-Attached Storage
KURMA: Geo-Distributed Secure Middleware for Cloud-Backed Network-Attached Storage
متن کاملPerformance Analysis of RAIDs in Storage Area Network
Direct Attached Storage, Network Attached Storage and Storage Area Network are the different kind of networking and storage facilities used in different domains from small scale industries to large scale industries. Storage area network is a disk system concentrated on network which allows clients or servers to use the disk system as a local disk. The speed of transmission of data to and from t...
متن کاملTask Force on Network Storage Architecture: Network attached storage is inevitable
We see networked attached storage as being a common means of storage connection and access by the year 2000. This will not, at first, be manifested in direct communication between any node on a network and an individual disc drive. Rather, the likely first step is that storage will be linked with clusters of file servers as part of a server-wide network. Later, broader sharing of storage access...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Micro
دوره 20 شماره
صفحات -
تاریخ انتشار 2000