Performance Improvement of an Iscsi-based Secure Storage Access
نویسندگان
چکیده
iSCSI protocol, used in building IP-based storage networks, is becoming more important because it realizes consolidation of storage at low cost, since security is a critical issue for the iSCSI protocol, on which remote storage is accessed over the IP networks. iSCSI can employ IPsec, which offers strong encryption. However, IPsec encryption processing degrades the performance of storage access and increases the CPU load of the server. In this paper, for realizing secure storage access efficiently on iSCSI networks, we propose the idea of an encryption scheme in the higher-level layer instead of an IPsec encryption scheme. We measured the performance on simple socket communication and on iSCSI communication using the proposed model, and compared our proposed scheme with IPsec. Consequently, our proposed method of encryption in the higher-level layer outperforms that of encryption using IPsec.
منابع مشابه
Performance Improvement of iSCSI Remote Storage Access through Optimization of Multiple Layers
iSCSI is one of the most popular protocols among the storage area network (SAN) working on an IP network. iSCSI is a standard to encapsulate a SCSI command into a TCP/IP packet, thus we can make an access to a storage system with commoditized IP devices only. In this paper, iSCSI sequential write access for a remote backup system is focused. It is well known that iSCSI experiences performance d...
متن کاملTrace System of iSCSI Storage
In this paper, an IP-SAN access trace method is proposed and its implementation is presented. IP-SAN and iSCSI are expected to remedy problems of Fibre Channel (FC)-based SAN. Because servers and storage cooperatively work with communications through TCP/IP layer in IP-SAN system, an integrated analysis of both sides is considered to be significant for achieving better performance. Our proposed...
متن کاملSimulation Study of iSCSI-based Storage System
iSCSI is becoming an important protocol to enable remote storage access through the ubiquitous TCP/IP network. Due to the significant shift in its transport mechanism, iSCSI-based storage system may possess different performance characteristics from the traditional storage system. Simulation offers a flexible way to study the iSCSI-based storage system. In this paper, we present a simulation wo...
متن کاملTCP Congestion Window Control on an ISCSI Read Access in a Long-Latency Environment
As the broadband networks are widely used, IP-SAN is expected as the next generation’s SAN because of its low cost. The iSCSI protocol, represented as IP-SAN technology, is becoming increasingly important. However, the performance of iSCSI network is lower than that of network based only on TCP/IP, due to its complex protocol processing in accessing storage with iSCSI. In this paper, we present...
متن کاملUbiqStor: A Remote Storage Service for Mobile Devices
In Ubiquitous computing environment the mobile devices such as PDAs necessarily connect to remote storage servers. We present an iSCSI caching system that localizes iSCSI target to overcome the shortcomings of iSCSI performance dropping sharply as the latency increases. 1 Motivation Mobile devices such as PDAs are evolving to be incorporated into Ubiquitous computing environment. Due to lightly...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004