Enhanced Data Security Framework for Storage Area Networks

Storage is an integral part of business continuity. The explosive growth of digital content requires a technology that delivers high availability, scalability, reliability, which are prime requirements of today’s business. The storage area network (SAN) is one promising solutions to handle storage demands of enterprise storage requirement. One of the major challenging task while designing SAN is addressing the security concerns. Since, SAN keeps the information in a centralized place, it is necessary to keep proper security measures to handle the internal and external attacks. This research paper discusses SAN architecture, various levels of threats, risks; security approaches and recommends an enhanced data security framework for the implementation of SAN as an enterprise storage solution

[1]  Erez Zadok,et al.  Proceedings of the General Track: 2003 Usenix Annual Technical Conference Ncryptfs: a Secure and Convenient Cryptographic File System , 2022 .

[2]  Yvo Desmedt,et al.  Man-in-the-Middle Attack , 2005, Encyclopedia of Cryptography and Security.

[3]  H. Apte,et al.  Serverless Network File Systems , 2006 .

[4]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[5]  Walter L. McKnight What Is Information Assurance , 2002 .

[6]  Erik Riedel,et al.  A Framework for Evaluating Storage System Security , 2002, FAST.

[7]  Howard Gobioff,et al.  Security for Network Attached Storage Devices , 1997 .

[8]  Kotagiri Ramamohanarao,et al.  Network Security Framework , 2006 .

[9]  Robert J. T. Morris,et al.  The evolution of storage systems , 2003, IBM Syst. J..

[10]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[11]  Himanshu Dwivedi Securing Storage: A Practical Guide to SAN and NAS Security , 2005 .

[12]  Janice C. Sipior,et al.  A Framework for Information Security Management Based on Guiding Standards: A United States Perspective , 2008 .

[13]  Jim Zelenka,et al.  A cost-effective, high-bandwidth storage architecture , 1998, ASPLOS VIII.

[14]  Tom Clark Designing Storage Area Networks , 1999 .

[15]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[16]  Mohammad Banikazemi,et al.  Storage-based intrusion detection for storage area networks (SANs) , 2005, 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST'05).

[17]  Ethan L. Miller,et al.  Design for a Decentralized Security System For Network Attached Storage , 2000, IEEE Symposium on Mass Storage Systems.

[18]  Gregory R. Ganger,et al.  Storage-Based Intrusion Detection , 2010, TSEC.

[19]  Benjamin Aziz,et al.  Configuring storage-area networks using mandatory security , 2009, J. Comput. Secur..

[20]  Gerald L. Kovacich,et al.  What is Information Assurance , 2001 .