The OSD security protocol

被引:0
|
作者
Factor, Michael [1 ]
Nagle, David [2 ]
Naor, Dalit [1 ]
Riedel, Erik [3 ]
Satran, Julian [1 ]
机构
[1] IBM Haifa Res Lab, Haifa, Israel
[2] Panasas, Pittsburgh, PA USA
[3] Segate Res, Pittsburgh, PA USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ANSI T10 Object-based Storage Devices (OSD) Standard is a new standard. It evolves the storage interface from fixed size blocks to variable size objects and includes an integrated security protocol that protects storage. This paper presents the requirements, the design tradeoffs, and the final security protocol as defined in the standard. The resulting protocol is based on a secure capability-based model, enabling fine-grained access control that protects both the entire storage device and individual objects from unauthorized access. The protocol defines three methods of security based on the applications' requirements. Furthermore, the protocol's key management algorithm allows keys to be changed quickly, without disrupting normal operations. Finally, the protocol is currently being enhanced for version 2.0 of the ANSI T10 OSD standard; future extensions will include data-encryption and access-control on sections of storage objects.
引用
收藏
页码:29 / +
页数:2
相关论文
共 50 条
  • [21] Security Analysis of the SASI Protocol
    Cao, Tianjie
    Bertino, Elisa
    Lei, Hong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (01) : 73 - 77
  • [22] A security protocol for RFID traceability
    Gandino, Filippo
    Montrucchio, Bartolomeo
    Rebaudengo, Maurizio
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (06)
  • [23] Validation of security protocol implementations from security objectives
    Fu, Yulong
    Kone, Ousmane
    [J]. COMPUTERS & SECURITY, 2013, 36 : 27 - 39
  • [24] Security protocol for active networks
    Cheng, Lawrence
    Galis, Alex
    [J]. ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 58 - +
  • [25] Implementing Security Protocol Monitors
    Chevalier, Yannick
    Rusinowitch, Michael
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2021, (342): : 22 - 34
  • [26] Security Protocol Deployment Risk
    Foley, Simon N.
    Bella, Giampaolo
    Bistarelli, Stefano
    [J]. SECURITY PROTOCOLS XVI, 2011, 6615 : 12 - +
  • [27] On the Provable Security of the Dragonfly Protocol
    Lancrenon, Jean
    Skrobot, Marjan
    [J]. INFORMATION SECURITY, ISC 2015, 2015, 9290 : 244 - 261
  • [28] Quantifying the Security of a QKD Protocol
    Parakh, Abhishek
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNCATIONS SYSTEMS (ANTS), 2015,
  • [29] Security Goals and Protocol Transformations
    Guttman, Joshua D.
    [J]. THEORY OF SECURITY AND APPLICATIONS, 2012, 6993 : 130 - 147
  • [30] A study on unknown protocol security
    Lee, Seungho
    Song, Wonjong
    Kim, Keechoen
    [J]. 2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 660 - 662