In order to ensure security of the enormous data stored in the storage area network system, current secure technology need large time and space consumption and extra storage space. The artificial immune algorithm can efficiently detect abnormal data. In order to keep high I/O performance of storage area network system, we use the artificial immune algorithm to detect the abnormal access request of the storage area network system, and we implement the secure storage area network system named ADSSAN. We present the structure of the metadata server with the central abnormal access request detection module, the storage device with the associate abnormal access request detection module and the secure storage area network system. The definitions of main elements are given. By analyzing the feature of the storage area network system, the master-slave artificial immune algorithm is presented. The central abnormal access request detection module generates all detectors and distributes part of detectors to the associate abnormal access request detection module in the storage servers. Then the distributed strategy of artificial immune algorithm can be used to reduce the time and space consumption of generating detectors and improve performance of abnormal access request detection. The prototype of abnormal access request detection module is implemented and tested, the result shows that the master-slave artificial immune algorithm can accurately detect abnormal access request with low time and space overhead. At last, the prototype of secure storage area network system is implemented on Lustre and evaluated its I/O performance. The result shows that the central and associate abnormal access request detection module can efficiently check out abnormal access request, and the prototype of secure storage area network system can keep high I/O performance.
[1]
Stephanie Forrest,et al.
Automated response using system-call delays
,
2000
.
[2]
Tan Zhipeng.
Study and Implementation of a Secure iSCSI Object-based Storage System
,
2007
.
[3]
Matt Blaze,et al.
A cryptographic file system for UNIX
,
1993,
CCS '93.
[4]
David Mazières,et al.
Fast and secure distributed read-only file system
,
2000,
TOCS.
[5]
Hongwei Dai,et al.
Immune Network Theory Based Artificial Immune System And Its Application For Pattern Recognition
,
2010
.
[6]
Zhang Yu,et al.
An Algorithm of r-Adjustable Negative Selection Algorithm and Its Simulation Analysis
,
2005
.
[7]
Craig A. N. Soules,et al.
Survivable storage systems
,
2001,
Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[8]
Fang Yun-fu.
Research on an Artificial Immune System-based Storage Anomaly Detection
,
2010
.
[9]
Li Tao.
An Immune Based Model for Network Monitoring
,
2006
.
[10]
Gongde Guo,et al.
An Efficient Remote Data Possession Checking in Cloud Storage
,
2011
.