A credential-based security mechanism for object storage

被引:0
|
作者
Li, Zhongmin [1 ]
Yu, Zhanwu [1 ]
机构
[1] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & R, Wuhan 430079, Hubei, Peoples R China
来源
2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING | 2006年
关键词
D O I
10.1109/ICCCAS.2006.284981
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unlike Direct Attached Storage (DAS), Network Attached Storage (NAS) or Storage Area Network (SAN), Object-based Storage, an emerging, network storage technology, separates the control path, the data path and the management path, and enables direct interaction between clients and the storage devices. Clients acquire only the metadata information and some cryptographic primitives from the metadata servers. The Clients., the metadata servers and the storage devices are separate, so it is very important to construct a security mechanism for securing data exchange between them. In this paper we present a credential-based security mechanism for Object-based Storage that stands on existing security infrastructure. In this mechanism, the Object-based Storage Device (OSD) security model is a credential-based access control system, and commands transfer and data access both need be authorized. The Client requests a credential including a capability key from the Security Manager after authenticated by the Security Manager through a PKI system. The Security Manager and the OSD Device (OBSD) have a shared secret key to calculate the capability key which is used as a single secret key to identify the integrity of credential and encrypt the communications between the Client and the OBSD.
引用
收藏
页码:1610 / +
页数:2
相关论文
共 50 条
  • [21] BLESS: Object level encryption security for object-based storage system
    Feng, Dan
    Chen, Junjian
    Liu, Jingning
    Wang, Zhikun
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 188 - 197
  • [22] A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
    Ashok Kumar Das
    Peer-to-Peer Networking and Applications, 2016, 9 : 223 - 244
  • [23] VCTP: A Verifiable Credential-based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms
    Mukta, Rahma
    Teh, Rue C.
    Paik, Hye-young
    Lu, Qinghua
    Kanhere, Salil S.
    2023 IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES, DAPPS, 2023, : 109 - +
  • [24] Data Security Storage Mechanism Based on Blockchain Network
    Wang, Jin
    Ou, Wei
    Wang, Wenhai
    Sherratt, R. Simon
    Ren, Yongjun
    Yu, Xiaofeng
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (03): : 4933 - 4950
  • [25] Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks
    Lee, Tian-Fu
    SENSORS, 2015, 15 (07) : 14960 - 14980
  • [26] Security Credential Mapping in Grids
    Ahsant, Mehran
    Gonzalez, Esteban Talavera
    Basney, Jim
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 481 - +
  • [27] Implementing and evaluating security controls for an object-based storage system
    Niu, Zhongying
    Zhou, Ke
    Feng, Dan
    Jiang, Hong
    Wang, Frank
    Chai, Hua
    Xiao, Wei
    Li, Chunhua
    24TH IEEE CONFERENCE ON MASS STORAGE SYSTEMS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 87 - +
  • [28] Security enhancement and performance evaluation of an object-based storage system
    Liu, Po-Chun
    Hong, Sheng-Kai
    Hsu, Yarsun
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, 4782 : 408 - 419
  • [29] iOBS3: an iSCSI-based object storage security system
    Huang Jianzhong
    Xie Changsheng
    Li Xu
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1442 - 1445
  • [30] iOBS3: An iSCSI-based Object Storage Security System
    Huang Jianzhong
    Me Changsheng
    Li Xu
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 652 - 660