Pledge: a Policy-based Security Protocol for Protecting Content Addressable Storage Architectures

نویسندگان

  • Wassim Itani
  • Ayman Kayssi
  • Ali Chehab
چکیده

In this paper we present PLEDGE, an efficient and scalable security ProtocoL for protecting fixedcontent objects in contEnt aDdressable storaGe (CAS) architEctures. PLEDGE follows an end-to-end policy-driven security approach to secure the confidentiality, integrity, and authenticity of fixed-content entities over the enterprise network links and in the nodes of the CAS device. It utilizes a customizable and configurable extensible mark-up language (XML) security policy to provide flexible, multi-level, and fine-grained encryption and hashing methodologies to fixed content CAS entities. PLEDGE secures data objects based on their content and sensitivity and highly overcomes the performance of bulk and raw encryption protocols such as the Secure Socket Layer (SSL) and the Transport Layer Security (TLS) protocols. Moreover, PLEDGE transparently stores sensitive objects encrypted (partially or totally) in the CAS storage nodes without affecting the CAS storage system operation or performance and takes into consideration the processing load, computing power, and memory capabilities of the client devices which may be constrained by limited processing power, memory resources, or network connectivity. PLEDGE complies with regulations such as the Health Insurance Portability and Accountability Act (HIPAA) requirements and the SEC Rule 17a-4 financial standards. The protocol is implemented in a real CAS network using an EMC Centera backend storage device. The application secured by PLEDGE in the sample implementation is an X-Ray radiography scanning system in a healthcare network environment. The experimental test bed implementation conducted shows a speedup factor of three over raw encryption security mechanisms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices

This paper presents PATRIOT, an optimized, policydriven security architecture for protecting the confidentiality and integrity of audit log files on wireless devices. PATRIOT is based on a set of well-known cryptographic protocols and is designed to suit the limited nature of wireless devices. It offers a policy-driven, customizable security model and specifies a flexible, multi-level, and fine...

متن کامل

Using Relational Syntactic Constraints in Content - Addressable Memory Architectures for Sentence Parsing

How linguistic representations in memory are searched and retrieved during sentence processing is an active question in psycholinguistics. Much work has independently suggested that retrieval operations require constant-time computations, are susceptible to interference, and operate under the constraint of a severely limited focus of attention. These features suggest a model for sentence proces...

متن کامل

A flexible design of network devices using reconfigurable content addressable memory

The content addressable memory is a memory unit that uses content matching instead of addresses. content addressable memory are used in different networking, telecommunications and storage applications because of their parallel, fast search capabilities. This paper presents a new method (called array method) for designing Reconfigurable content addressable memory (RCAM). The behavior of the new...

متن کامل

A phase-image-based content-addressable holographic storage with security

We demonstrate content-addressable holographic data storage with security using random phase encoding in the Fresnel domain. The phase-based data pages are encrypted using a random phase mask in the Fresnel domain, and recorded on a photorefractive LiNbO3: Fe crystal using angular multiplexing. While content-searching through this database, the correct random phase mask and its position are cri...

متن کامل

Evolution of Enterprise Security Federation

In this chapter, we discuss the evolution of the enterprise security federation, including why the framework should be evolved and how it has been developed and applied to real systems. Furthermore, we analyze the remaining vulnerabilities and weaknesses in current approaches and propose new approaches to resolve those problems. Then, to overcome those weaknesses and vulnerabilities, we propose...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010