Decentralized authentication mechanisms for object-based storage devices

被引:0
作者
Kher, V [1 ]
Kim, Y [1 ]
机构
[1] Univ Minnesota, Minneapolis, MN 55455 USA
来源
SECOND IEEE INTERNATIONAL SECURITY IN STORAGE WORKSHOP, PROCEEDINGS | 2004年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file manager only to acquire the meta-data information and some cryptographic primitives, for example, access keys. Most of the current schemes rely on a centralized file manager to support these activities. This paper presents security mechanisms for decentralized authentication for object-based storage. The schemes are novel in several ways. First of all, they reduce the load on the file manager and free the system from central point of failure and denial of service attacks. We exploit Role-based Access Control (RBAC) to provide scalability, and design authentication schemes that efficiently utilize RBAC. In most of the cases, the client needs to acquire only one access key from the file manager which can be used by the client to further derive role-keys for the roles that he/she is permitted to play within an organization. Further, the number of cryptographic keys required for the purpose of authentication. in these schemes is less as compared to the existing schemes. Finally. we also present two simple schemes that enable the clients to access objects stored on any device on the network using a single identity key.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 20 条
[1]  
AZAGURY A, 2002, P 1 IEEE INT SEC STO
[2]  
BADULESCU I, 1998, CUCS02198
[3]  
Blaze M., 1993, ACM Conference on Computer and Communications Security, P9, DOI 10.1145/168588.168590
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]  
FERRAIOLO D, 1992, 15 NIST NSA NAT COMP
[6]  
FERRAIOLO DF, 1993, NIST NCSC NAT COMP S
[7]  
FERRAIOLO DF, 2001, ACM T INFORMATION SY
[8]  
GIBSON G, 1997, P ACM INT C MEAS MOD
[9]  
GOBIOFF H, 1999, THESIS CMU
[10]  
HOWARD JH, 1998, P USENIX WINT TECHN