Embedded Security for Network-Attached Storage
نویسندگان
چکیده
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to the multi-host Internet-based systems of Network-attached Secure Disks (NASD), protecting the integrity of data transfers between client and storage becomes essential. However, it is also computationally expensive and can impose significant performance penalties on storage systems. This paper explores several techniques that can protect the communications integrity of storage requests and data transfers, imposing very little performance penalty and significantly reducing the amount of required cryptography. Central to this work is an alternative cryptographic approach, called “Hash and MAC”, that reduces the cost of protecting the integrity of read traffic in storage devices that are unable to generate a message authentication code at full data transfers rates. Hash and MAC does this by precomputing security information, using and reusing the precomputed information on subsequent read requests. We also present a refined “Hash and MAC” approach that uses incremental hash functions to improve the performance of small read and write operations as well as non-block-aligned operations. Embedded Security for Network-Attached Storage Howard Gobioff1, David Nagle2, Garth Gibson1 June 1999 CMU-CS-99-154 School of Computer Science Carnegie Mellon University Pittsburgh, Pennsylvania 15213-3890 Contact: David Nagle ([email protected]) Office: 412-268-3898 Fax: 412-268-6353 1. School of Computer Science, can be reached via email at {hgobioff,garth}@cs.cmu.edu 2. Department of Electrical and Computer Engineering, can be reached via email at [email protected] This research is sponsored by DARPA/ITO through DARPA Order D306, and issued by Indian Head Division, NSWC under contract N00174-96-0002. Additional support was provided by the member companies of the Parallel Data Consortium, including: Hewlett-Packard Laboratories, Hitachi, IBM, Intel, Quantum, Seagate Technology, Siemens, Storage Technology, Wind River Systems, 3Com Corporation, Compaq, Data General/Clariion, and LSI Logic. ACM Computing Reviews
منابع مشابه
Storage Protection with Intel® Anti-Theft Technology - Data Protection (Intel® AT-d)
Data-at-rest (DAR) encryption, embedded in peripheral controller hardware, combines the security, reliability, and performance benefits of storage device encryption, but it doesn’t impact the enterprise services necessary for low-cost operation and worker productivity. This kind of encryption is highly adaptable to the needs of new-use models that cache data in high-speed flash memory or that s...
متن کاملEmbedded Security for Network-Attached Storage (CMU-CS-99-154)
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to the multi-host Internet-based systems of Network-attached Secure Disks (NASD), protecting the integrity of data transfers between client and storage becomes essential. However, it is also computationally expensive and can impose significant performance penalties on storage systems. This paper expl...
متن کاملSNARE: A Strong Security Scheme for Network-Attached Storage
This paper presents a strong security scheme for network-attached storage (NAS) that is based on capability and uses a key distribution scheme to keep network-attached storage from performing key management. Our system uses strong cryptography to protect data from spoofing, tampering, eavesdropping and replay attacks, and it also guarantees that the data stored on the storage is copy-resistant....
متن کاملFlexible Security for the WiND Filesystem
Due to the unending increase in scalability and performance demands, the network attached storage paradigm is being adopted as the solution for large storage systems. This new shift seeks to decentralize storage elements over a network where the idea is to transfer data directly between the storage disks and client machines thereby completely bypassing the fileserver machine bottleneck. The new...
متن کاملSecurity for a High Performance Commodity Storage Subsystem
How do we incorporate security into a high performance commodity storage subsystem? Technology trends and the increasing importance of I/O bound workloads are driving the development of commodity network attached storage devices which deliver both increased functionality and increased performance to end-users. In the network attached world, storage devices co-exist on the network with their cli...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999