IP Storage Security Analysis

被引:0
|
作者
Bilski, Tomasz [1 ]
机构
[1] Poznan Univ Tech, Poznan, Poland
来源
COMPUTER NETWORKS | 2012年 / 291卷
关键词
IP; IP storage; SCSI; Fibre Channel;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The paper presents analysis of different methods used to protect IP storage systems. The problem is, if the existing tools and methods for securing common Internet services like WWW, VoIP are suitable to IP storage system protection? The necessary security services such as: authentication, integrity and encryption may be provided in many different ways. It is necessary to select optimal method for a given application. The main part of the paper is related to evaluation of various IF storage systems that utilize iSCSI protocol for transfer and IPSec protocol for protection. Several methods and implementations of security systems with different crypto module locations (client, server, storage medium) and with different implementations (software or hardware) are examined. The following attributes of the systems are analyzed: security level, performance/throughput overhead, cost, flexibility.
引用
收藏
页码:216 / 228
页数:13
相关论文
共 50 条
  • [1] Security of IP Telephony in Ecuador: Online Analysis
    Estrada, Jose
    Calva, Mayra
    Rodriguez, Ana
    Tipantuna, Christian
    [J]. ENFOQUE UTE, 2016, 7 (02): : 25 - 40
  • [2] A critical analysis of multilayer IP security protocol
    Sing, J
    Soh, B
    [J]. Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 683 - 688
  • [3] SECURITY ANALYSIS OF TCP/IP NETWORKS An Approach to Automatic Analysis of Network Security Properties
    Sveda, Miroslav
    Rysavy, Ondrej
    Matousek, Petr
    Rab, Jaroslav
    Cejka, Rudolf
    [J]. DCNET 2010/OPTICS 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA COMMUNICATION NETWORKING AND INTERNATIONAL CONFERENCE ON OPTICAL COMMUNICATION SYSTEM, 2010, : 5 - 11
  • [4] IP security
    Souflis, D
    [J]. DR DOBBS JOURNAL, 2000, 25 (04): : 10 - 10
  • [5] IP security
    Baltatu, M
    Lioy, A
    [J]. ADVANCED SECURITY TECHNOLOGIES IN NETWORKING, 2001, 178 : 95 - 108
  • [6] Analysis of security vulnerability diagnosis in mobile IP networks
    Lee, Dong Chun
    [J]. Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, Proceedings, 2006, 4331 : 949 - 954
  • [7] Security analysis of Voice-over-IP protocols
    Gupta, Prateek
    Shmatikov, Vitaly
    [J]. 20th IEEE Computer Security Foundations Symposium (CSFS20), Proceedings, 2007, : 49 - 63
  • [8] Cloud Storage Encryption Security Analysis
    Zhang Jing
    Wang Jinsu
    Zheng Zhuangfeng
    Zhao Chongan
    [J]. PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2016), 2016, : 62 - 65
  • [9] The design of VisFlowConnect-IP: a link analysis system for IP security Situational awareness
    Yin, XX
    Yurcik, W
    Slagell, A
    [J]. Third IEEE International Workshop on Information Assurance, Proceedings, 2005, : 141 - 153
  • [10] IP camera security: "Security Eyes"
    Alshamrani, Sultan S.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (02): : 75 - 80