MSS '03 Proceedings of the 20 th IEEE/11 th NASA Goddard Conference on Mass Storage Systems and Technologies (MSS'03)
Decentralized Authentication Mechanisms for Object-based Storage Devices
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Securing distributed storage: challenges, techniques, and systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
Secure capabilities for a petabyte-scale object-based distributed file system
Proceedings of the 2005 ACM workshop on Storage security and survivability
Scalable security for large, high performance storage systems
Proceedings of the second ACM workshop on Storage security and survivability
Scalable security for petascale parallel file systems
Proceedings of the 2007 ACM/IEEE conference on Supercomputing
Implementation of OSD security framework and credential cache
GPC'07 Proceedings of the 2nd international conference on Advances in grid and pervasive computing
Insurable storage services: creating a marketplace for long-term document archival
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part III
Hi-index | 0.00 |
Storage Area Networks (SAN) are based on direct interactionbetween clients and storage servers. This unmediatedaccess exposes the storage server to network attacks,necessitating a verification, by the server, that the client requestsconform with the system protection policy. Solutionstoday can only enforce access control at the granularity ofentire storage servers. This is an outcome of the way storageservers abstract storage: an array of fixed size blocks.Providing access control at the granularity of blocks is infeasible - there are too many active blocks in the server.Thus, the coarse granularity of entire servers is used. Objectstores (e.g., the NASD system [10]) on the other handprovide means to address these issues. An object store controlunit presents an abstraction of a dynamic collection ofobjects, each can be seen as a different array of blocks, thusproviding the basis for protection at the object level.In this paper we present a security model for the objectstore which leverages on existing security infrastructure.We give a simple generic mechanism capable of enforcingan arbitrary access control policy at object granularity.This mechanism is specifically designed to achievelow overhead by minimizing the cost of validating an operationalong the critical data path, and lends itself for optimizationssuch as caching. The key idea of the model isto separate the mechanisms for transport security from theone used for access control and to maximize the use standardsecurity protocols when possible. We utilize a standardindustry protocol for authentication, integrity and privacyon the communication channel (IPSec for IP networks) anddefine a proprietary protocol for authorization on top of thesecure communication layer.