A Two Layered Approach for Securing an Object Store Network

  • Authors:
  • Alain Azagury;Ran Canetti;Michael Factor;Shai Halevi;Ealan Henis;Dalit Naor;Noam Rinetzky;Ohad Rodeh;Julian Satran

  • Affiliations:
  • -;-;-;-;-;-;-;-;-

  • Venue:
  • SISW '02 Proceedings of the First International IEEE Security in Storage Workshop
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

Storage Area Networks (SAN) are based on direct interactionbetween clients and storage servers. This unmediatedaccess exposes the storage server to network attacks,necessitating a verification, by the server, that the client requestsconform with the system protection policy. Solutionstoday can only enforce access control at the granularity ofentire storage servers. This is an outcome of the way storageservers abstract storage: an array of fixed size blocks.Providing access control at the granularity of blocks is infeasible - there are too many active blocks in the server.Thus, the coarse granularity of entire servers is used. Objectstores (e.g., the NASD system [10]) on the other handprovide means to address these issues. An object store controlunit presents an abstraction of a dynamic collection ofobjects, each can be seen as a different array of blocks, thusproviding the basis for protection at the object level.In this paper we present a security model for the objectstore which leverages on existing security infrastructure.We give a simple generic mechanism capable of enforcingan arbitrary access control policy at object granularity.This mechanism is specifically designed to achievelow overhead by minimizing the cost of validating an operationalong the critical data path, and lends itself for optimizationssuch as caching. The key idea of the model isto separate the mechanisms for transport security from theone used for access control and to maximize the use standardsecurity protocols when possible. We utilize a standardindustry protocol for authentication, integrity and privacyon the communication channel (IPSec for IP networks) anddefine a proprietary protocol for authorization on top of thesecure communication layer.