Authenticating Network-Attached Storage

نویسندگان

  • Benjamin Reed
  • Edward G. Chron
  • Randal C. Burns
  • Darrell D. E. Long
چکیده

0272-1732/00/$10.00  2000 IEEE The need to access anything from anywhere has increased the role of distributed file servers in computing. Distributed file systems provide local file system semantics for access to remote storage. This allows network clients to incorporate the remote storage into their local file system. File semantics are well understood by users and applications, making distributed file servers a convenient tool in developing distributed applications. As the role played by distributed file systems expands, problems with their design become increasingly evident. Faster clients, high-bandwidth connections, and larger drive capacities increase the demand on file servers. Although it would seem that the I/O capacity of the system storage devices would limit network file server performance, in actuality, file servers frequently are CPU bound. Riedel and Gibson discovered that, even with low overall CPU utilization, burst loads were sufficiently intense to overuse the server. In addition to the performance problems of distributed network file systems, security also presents a problem. Applications that rely on distributed file systems should not be compromised by security weaknesses of the file systems on which they are built. Local file systems have a single kernel that restricts access to file data, but because a distributed file system involves multiple servers and clients, it cannot rely on a single kernel to restrict access. The security risk is even greater since the network that connects servers and clients may also pose a threat. The authenticated network-attached disks we present address these problems by providing an architecture based on one-way hash functions that make available mutual authentication of the network disks and the clients. This architecture obviates the need for more performance-intensive authentication methods such as public-key encryption and Kerberos, but does not preclude their use. The authentication protocol used by the network storage is very simple and flexible, and allows keys to be created and managed using existing authentication systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IEEE Std 802.1X-2001, IEEE Standard for Local and metropolitan area networks---Port-Based Network Access Control

Port-based network access control makes use of the physical access characteristics of IEEE 802 Local Area Networks (LAN) infrastructures in order to provide a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics, and of preventing access to that port in cases in which the authentication and authorization process fails.

متن کامل

An Analytic Model of Hierarchical Mass Storage Systemswith Network - Attached Storage

Network attached storage devices improve I/O performance by separating control and data paths and eliminating host intervention during data transfer. Devices are attached to a high speed network for data transfer and to a slower network for control messages. Hierarchical mass storage systems use disks to cache the most recently used les and tapes (robotic and manually mounted) to store the bulk...

متن کامل

KURMA: Geo-Distributed Secure Middleware for Cloud-Backed Network-Attached Storage

KURMA: Geo-Distributed Secure Middleware for Cloud-Backed Network-Attached Storage

متن کامل

Performance Analysis of RAIDs in Storage Area Network

Direct Attached Storage, Network Attached Storage and Storage Area Network are the different kind of networking and storage facilities used in different domains from small scale industries to large scale industries. Storage area network is a disk system concentrated on network which allows clients or servers to use the disk system as a local disk. The speed of transmission of data to and from t...

متن کامل

Task Force on Network Storage Architecture: Network attached storage is inevitable

We see networked attached storage as being a common means of storage connection and access by the year 2000. This will not, at first, be manifested in direct communication between any node on a network and an individual disc drive. Rather, the likely first step is that storage will be linked with clusters of file servers as part of a server-wide network. Later, broader sharing of storage access...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Micro

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2000