A credential-based security mechanism for object storage

被引:0
|
作者
Li, Zhongmin [1 ]
Yu, Zhanwu [1 ]
机构
[1] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & R, Wuhan 430079, Hubei, Peoples R China
关键词
D O I
10.1109/ICCCAS.2006.284981
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unlike Direct Attached Storage (DAS), Network Attached Storage (NAS) or Storage Area Network (SAN), Object-based Storage, an emerging, network storage technology, separates the control path, the data path and the management path, and enables direct interaction between clients and the storage devices. Clients acquire only the metadata information and some cryptographic primitives from the metadata servers. The Clients., the metadata servers and the storage devices are separate, so it is very important to construct a security mechanism for securing data exchange between them. In this paper we present a credential-based security mechanism for Object-based Storage that stands on existing security infrastructure. In this mechanism, the Object-based Storage Device (OSD) security model is a credential-based access control system, and commands transfer and data access both need be authorized. The Client requests a credential including a capability key from the Security Manager after authenticated by the Security Manager through a PKI system. The Security Manager and the OSD Device (OBSD) have a shared secret key to calculate the capability key which is used as a single secret key to identify the integrity of credential and encrypt the communications between the Client and the OBSD.
引用
收藏
页码:1610 / +
页数:2
相关论文
共 50 条
  • [1] A credential-based system for the anonymous delegation of rights
    Demuynck, Liesje
    De Decker, Bart
    Joosen, Wouter
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 169 - +
  • [2] Safe credential-based trust protocols: A framework
    Almuhammadi, Sultan
    Sui, Nien T.
    2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, (WI 2006 MAIN CONFERENCE PROCEEDINGS), 2006, : 949 - +
  • [3] Clustering subjects in a credential-based access control framework
    Stoupa, K.
    Vakali, A.
    COMPUTERS & SECURITY, 2007, 26 (02) : 120 - 129
  • [4] Anonymous Credential-Based Access Control Scheme for Clouds
    Yao, Xuanxia
    Liu, Hong
    Ning, Huansheng
    Yang, Laurence T.
    Xiang, Yang
    IEEE CLOUD COMPUTING, 2015, 2 (04): : 34 - 43
  • [5] An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
    Li, Chun-Ta
    Weng, Chi-Yao
    Lee, Cheng-Chi
    SENSORS, 2013, 13 (08): : 9589 - 9603
  • [6] A credential-based data path architecture for assurable global networking
    Wolf, Tilman
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 3051 - 3057
  • [7] Towards Credential-based Device Registration in DApps for DePINs with ZKPs
    Heiss, Jonathan
    Castillo, Fernando
    Fan, Xinxin
    2024 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN, BLOCKCHAIN 2024, 2024, : 583 - 590
  • [8] Constant-Size Credential-Based Packet Forwarding Verification in SDN
    Wu, Ping
    Chang, Chao-Wen
    Ma, Ying-Ying
    Zuo, Zhi-Bin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [9] Object storage security mechanism design based on the single secret key
    Lu, Hua
    Zhang, Shiyong
    Zhong, Yiping
    Jisuanji Gongcheng/Computer Engineering, 2005, 31 (07): : 148 - 150
  • [10] An efficient credential-based scheme for cross-domain file sharing
    Chen, Lanxiang
    Feng, Dan
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 614 - +