The OSD security protocol

被引:0
|
作者
Factor, Michael [1 ]
Nagle, David [2 ]
Naor, Dalit [1 ]
Riedel, Erik [3 ]
Satran, Julian [1 ]
机构
[1] IBM Haifa Res Lab, Haifa, Israel
[2] Panasas, Pittsburgh, PA USA
[3] Segate Res, Pittsburgh, PA USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ANSI T10 Object-based Storage Devices (OSD) Standard is a new standard. It evolves the storage interface from fixed size blocks to variable size objects and includes an integrated security protocol that protects storage. This paper presents the requirements, the design tradeoffs, and the final security protocol as defined in the standard. The resulting protocol is based on a secure capability-based model, enabling fine-grained access control that protects both the entire storage device and individual objects from unauthorized access. The protocol defines three methods of security based on the applications' requirements. Furthermore, the protocol's key management algorithm allows keys to be changed quickly, without disrupting normal operations. Finally, the protocol is currently being enhanced for version 2.0 of the ANSI T10 OSD standard; future extensions will include data-encryption and access-control on sections of storage objects.
引用
收藏
页码:29 / +
页数:2
相关论文
共 50 条
  • [1] Implementation of OSD security framework and credential cache
    Kim, Gu Su
    Ko, Kwang Sun
    Kim, Ungmo
    Eom, Young Ik
    [J]. ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS, 2007, 4459 : 666 - +
  • [3] A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace a nd Security Protocol Implementation Ontology
    He, Xudong
    Liu, Jiabing
    Huang, Chin-Tser
    Wang, Dejun
    Meng, Bo
    [J]. IEEE ACCESS, 2019, 7 : 131050 - 131067
  • [4] ON SECURITY OF THE SESPAKE PROTOCOL
    Alekseev, E. K.
    Smyshlyaev, S., V
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (50): : 5 - 41
  • [5] OSD EFFICIENCY
    LEOPOLD, RJ
    [J]. AVIATION WEEK & SPACE TECHNOLOGY, 1983, 118 (15): : 86 - 86
  • [6] Internet security protocol
    Markham, T
    [J]. DR DOBBS JOURNAL, 1997, 22 (06): : 70 - +
  • [7] On the Security of the Dandelion Protocol
    Goncalves, Brian
    Mashatan, Atefeh
    [J]. MATHEMATICS, 2022, 10 (07)
  • [8] Managing Security: The Security Content Automation Protocol
    Radack, Shirley
    Kuhn, Rick
    [J]. IT PROFESSIONAL, 2011, 13 (01) : 9 - 11
  • [9] 轻松搞定OSD
    泡泡
    [J]. 电脑采购周刊, 2000, (18) : 21 - 21
  • [10] A Lightweight IoT Security Protocol
    Hammi, Mohamed Tahar
    Livolant, Erwan
    Bellot, Patrick
    Serhrouchni, Ahmed
    Minet, Pascale
    [J]. 2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,