Analysis Of A Security Protocol In A Cluster Storage System
Price
Free (open access)
Volume
45
Pages
11
Page Range
61 - 71
Published
2013
Size
220 kb
Paper DOI
10.2495/DATA130061
Copyright
WIT Press
Author(s)
A. K. M. Nazmus Sakib & M. Nijim
Abstract
This paper represents a review of security vulnerabilities in a cluster storage system. In particular, we focus on identifying the different network level vulnerabilities including attack on the authentication, key exchange and data transfer protocol. We provide a brief description of the different functional entities and we investigate several technical issues including infrastructure and aspects related to the security of the existing system. This paper proposes a secure authentication technique for the network layer of DAS, SAN and NAS. We also bring unencrypted data communication under an encryption process. We implement the concept of shared key by using a one way chain algorithm for block transfer of data. We integrate a new protocol to maintain the level of security according to the data priority concept. Keywords: cluster, authentication, hash chain, time stamp.
Keywords
Keywords: cluster, authentication, hash chain, time stamp.