The OSD security protocol

被引:0
|
作者
Factor, Michael [1 ]
Nagle, David [2 ]
Naor, Dalit [1 ]
Riedel, Erik [3 ]
Satran, Julian [1 ]
机构
[1] IBM Haifa Res Lab, Haifa, Israel
[2] Panasas, Pittsburgh, PA USA
[3] Segate Res, Pittsburgh, PA USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ANSI T10 Object-based Storage Devices (OSD) Standard is a new standard. It evolves the storage interface from fixed size blocks to variable size objects and includes an integrated security protocol that protects storage. This paper presents the requirements, the design tradeoffs, and the final security protocol as defined in the standard. The resulting protocol is based on a secure capability-based model, enabling fine-grained access control that protects both the entire storage device and individual objects from unauthorized access. The protocol defines three methods of security based on the applications' requirements. Furthermore, the protocol's key management algorithm allows keys to be changed quickly, without disrupting normal operations. Finally, the protocol is currently being enhanced for version 2.0 of the ANSI T10 OSD standard; future extensions will include data-encryption and access-control on sections of storage objects.
引用
收藏
页码:29 / +
页数:2
相关论文
共 50 条
  • [41] A Security Service Protocol for MANETs
    Taddeo, Antonio Vincenzo
    Ferrante, Alberto
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1076 - 1077
  • [42] Cordial Security Protocol Programming The Obol Protocol Language
    Myrvang, Per Harald
    Stabell-Kulo, Tage
    [J]. SECURITY PROTOCOLS, 2009, 5087 : 62 - +
  • [43] Research on the optimization of communication protocol in network security protocol
    Sun, Daoyuan
    [J]. SOFT COMPUTING, 2022, 26 (16) : 7959 - 7966
  • [44] Security analysis of the MPOA protocol
    Rampal, S
    Wang, CX
    [J]. IEEE SOUTHEASTCON '99, PROCEEDINGS, 1999, : 102 - 105
  • [45] On the security of the Tor authentication protocol
    Goldberg, Ian
    [J]. Privacy Enhancing Technologies, 2006, 4258 : 316 - 331
  • [46] Research on the optimization of communication protocol in network security protocol
    Daoyuan Sun
    [J]. Soft Computing, 2022, 26 : 7959 - 7966
  • [47] A thin security layer protocol over IP protocol on TCP/IP suite for security enhancement
    Al-Jarrah, Mohammad
    Tamimi, Abdel-Karim R.
    [J]. 2006 INNOVATIONS IN INFORMATION TECHNOLOGY, 2006, : 232 - +
  • [49] A Security Analysis and Revised Security Extension for the Precision Time Protocol
    Itkin, Eyal
    Wool, Avishai
    [J]. 2016 IEEE INTERNATIONAL SYMPOSIUM ON PRECISION CLOCK SYNCHRONIZATION FOR MEASUREMENT, CONTROL AND COMMUNICATION (ISPCS 2016), 2016, : 12 - 17
  • [50] Voice interactive personalized security protocol: Definition and security analysis
    Zisiadis, Dimitris
    Kopsidas, Spyros
    Tassiulas, Leandros
    [J]. 2007 3RD IEEE WORKSHOP ON SECURE NETWORK PROTOCOLS, 2007, : 31 - 36