A Two Layered Approach for Securing an Object Store Network

نویسندگان

  • Alain Azagury
  • Ran Canetti
  • Michael Factor
  • Shai Halevi
  • Ealan A. Henis
  • Dalit Naor
  • Noam Rinetzky
  • Ohad Rodeh
  • Julian Satran
چکیده

Storage Area Networks (SAN) are based on direct interaction between clients and storage servers exposing the storage server to network attacks. Giving the client direct access to the storage servers requires verification that the client requests conform with the system protection policy. Today, the only available solutions enforce access control at the granularity of entire storage servers. This is an outcome of the way storage servers abstract storage: an array of fixed size blocks. The alternative approach of providing access control at the granularity of blocks is infeasible there are too many active blocks in the server. Object stores (r.g., the NASD system [7]) provide means to address these issues. An object store control unit presents an abstraction of a dynamic collection of objects, each can be seen as a different array of blocks, thus providing the basis for providing protection at an object level. In this paper we present a security model for the object store which leverages on existing security infrastructure. We give a simple generic mechanism capable of enforcing an arbitrary access control policy at object granularity. This mechanism is specifically designed to achieve low overhead by minimizing the cost of validating an operation along the critical data path, and lends itself for optimizations such as caching. The key idea of the model is to separate the mechanisms for transport security from the one used for access control and to maximize the use standard security protocols when possible. We utilize a standard industry protocol for authentication, integrity and privacy on the communication channel (IPSec for IP networks) and define a proprietary protocol for authorization on top of the secure communication layer.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards an Object Store

Today’s SAN architectures promise unmediated host access to storage (i.e., without going through a server). To achieve this promise, however, we must address several issues and opportunities raised by SANs, including security, scalability and management. Object storage, such as introduced by the NASD work [14], is a means of addressing these issues and opportunities. An object store raises the ...

متن کامل

Signal Prediction by Layered Feed - Forward Neural Network (RESEARCH NOTE).

In this paper a nonparametric neural network (NN) technique for prediction of future values of a signal based on its past history is presented. This approach bypasses modeling, identification, and parameter estimation phases that are required by conventional parametric techniques. A multi-layer feed forward NN is employed. It develops an internal model of the signal through a training operation...

متن کامل

Persistent object stores

The design and development of a type secure persistent object store is presented as part of an architecture to support experiments in concurrency, transactions and distribution. The persistence abstraction hides the physical properties of data from the programs that manipulate it. Consequently, a persistent object store is required to be of unbounded size, infinitely fast and totally reliable. ...

متن کامل

A New Approach for Constructing Pore Network Model of Two Phase Flow in Porous Media

Development of pore network models for real porous media requires a detailed understanding of physical processes occurring on the microscopic scale and a complete description of porous media morphology. In this study, the microstructure of porous media has been represented by three dimensional networks of interconnected pores and throats which are designed by an object oriented approach. Af...

متن کامل

Architecture and Interface of a Self-Securing Object Store

Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep all versions of all data for a window of time, regardless of the commands received from potentially compromised host operating systems. Within this window, system administrators have valuable infor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002