Design and Analysis of a Scalable Third-Party Storage Security Protocol

With the trend of networking and the growth of data value, networked storage security becomes hotpot of research. Aiming at the scalability and security requirement of massive storage system, we proposed a security storage service model combining storage mechanism and security policy and designed a set of scalable third-party security protocols. The protocols adopt public-key cryptography to guarantee the integrity of capability, avoiding the maintenance of shared key. The results of the formal analysis logically ensure the feasibility of the proposed security protocol. Furthermore, the overhead evaluation of the capability illustrates that the security protocol can meet the scalability requirement of storage system.

[1]  Garth A. Gibson,et al.  Security for a high performance commodity storage subsystem , 1999 .

[2]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  Rolf Riesen,et al.  Lightweight I/O for Scientific Applications , 2006, 2006 IEEE International Conference on Cluster Computing.

[4]  Andrew W. Leung,et al.  Scalable security for large, high performance storage systems , 2006, StorageSS '06.

[5]  Ethan L. Miller,et al.  Secure capabilities for a petabyte-scale object-based distributed file system , 2005, StorageSS '05.

[6]  Feng Deng The Approaches and Technologies for Formal Verification of Security Protocols , 2006 .

[7]  Randal C. Burns,et al.  Authenticating Network-Attached Storage , 2000, IEEE Micro.

[8]  Ling Liu,et al.  Security vs performance: tradeoffs using a trust framework , 2005, 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST'05).

[9]  John P. Boyd,et al.  Asymptotic Fourier Coefficients for a C∞ Bell (Smoothed-“Top-Hat”) & the Fourier Extension Problem , 2006, J. Sci. Comput..

[10]  Michael Burrows,et al.  Proceedings of Fast '03: 2nd Usenix Conference on File and Storage Technologies 2nd Usenix Conference on File and Storage Technologies Block-level Security for Network-attached Disks , 2022 .

[11]  Jack B. Dennis,et al.  Programming semantics for multiprogrammed computations , 1966, CACM.

[12]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.