Decentralized Authentication Mechanisms for Object-based Storage Devices

  • Authors:
  • Affiliations:
  • Venue:
  • SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Network-attached object-based storage separatesdata-path from control-path and enables directinteraction between clients and the storage devices.Clients interact with the file manager only toacquire the meta-data information and some cryptographicprimitives, for example, access keys. Most ofthe current schemes rely on a centralized file managerto support these activities.This paper presents security mechanisms for decentralizedauthentication for object-based storage. Theschemes are novel in several ways. First of all, they reducethe load on the file manager and free the systemfrom central point of failure and denial of service attacks.We exploit Role-based Access Control (RBAC) toprovide scalability and design authentication schemesthat efficiently utilize RBAC. In most of the cases, theclient needs to acquire only one access key from thefile manager, which can be used by the client to furtherderive role-keys for the roles that he/she is permittedto play within an organization. Further, the numberof cryptographic keys required for the purpose of authenticationin these schemes is less as compared to theexisting schemes. Finally, we also present two simpleschemes that enable the clients to access objects storedon any device on the network using a single identity key.