Cryptographic Security for a High-Performance Distributed File System
#1

Cryptographic Security for a High-Performance Distributed File System

[attachment=18232]

INTRODUCTION :

Security is quickly becoming a mandatory feature of data storage systems. Today, storage space is typically provided by complex networked systems. These networks have traditionally been confined to data centers in physically secured locations.
With the availability of high-speed LANs and storage networking protocols such as FCIP and iSCSI , these networks are becoming virtualized and open to access from user machines. Hence clients may access the storage devices directly, and the existing static security methods no longer make sense.
Therefore ,new dynamic security mechanisms and secure storage system are required for protecting stored data in virtualized and networked storage systems to ensure confidentiality and the integrity of the stored data.


EXISTING SYSTEM :

DISADVANTAGES:
These systems contain a distributed file system that works with untrusted storage server.
It guarantees that clients can detect any violation of integrity and consistency but cannot prevent modifications to the stored data by the server.
These systems do not contain an explicit security provider responsible for key management, in which per-user master keys to protect per-file keys are maintained.



ADVANTAGES :
A cryptographic file system has been implemented using secure network-attached disks (SNAD) . SNAD storage devices are a hybrid design, providing traditional block storage as well as strong client authentication for any operation.
Provides confidentiality protection by data encryption and integrity protection by means of hash trees.
Data is encrypted by the clients before sending it to the SNAD and authenticated using per-block digital signatures or per-block secret-key authentication .



A CLIENT DRIVER:
The cryptographic extensions are located in the client driver.
It performs the cryptographic operations on the bulk data.
It consists of two main parts:
1.Storage Tank File System :
The STFS module contains the platform-dependent layer of the driver and implements the interface to the VFS layer of the Linux kernel. It handles reading and writing of file data from and to the page cache and the block devices.
2.Client State Manager :
The CSM is the part of the driver that interacts with the MDS using the SAN.FS protocol. It maintains the object attributes, including the cryptographic attributes.



THE META-DATA SERVER(MDS) :
This allows the administrator to specify a uniform policy for the cryptographic protection applied to the file system.
The MDS can also generate an encryption key upon creation of a new file.
The MDS implementation takes an active role in setting the cryptographic attributes:
1. To mandate the choice of particular encryption and hash methods.
2. It can be configured to enforce that the encryption and integrity protection flags be turned on or off.



THE FILE ENCRYPTION(AES):



The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data.
The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information.
Encryption converts data to an unintelligible form called ciphertext; decrypting the cipher text converts the data back into its original form, called plaintext.
The AES algorithm is capable of using cryptographic keys of 128, 92, and 256 bits to encrypt and decrypt data in blocks of 128 bits.






Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: distributed file systems, seminar topics in distributed file system, anandabazar 9 4 2015ptimal cyclic cryptographic system, acheiving, file system security, secure optimal cyclic cryptographic system base paper, acheiving network security by ecpvs ecdh and ecies cryptographic algorithms using di,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Wireless LAN Security FULL REPORT seminar details 3 5,141 06-11-2014, 09:23 PM
Last Post: seminar report asees
  SKY HIGH INSTITUTE OF MANAGEMENT seminar details 4 3,339 23-08-2013, 10:56 AM
Last Post: computer topic
  GSM Based Home Security System details seminar paper 1 1,975 14-11-2012, 12:29 PM
Last Post: seminar details
  DESIGN AND IMPLEMENTATION OF LASER BASED HOME SECURITY SYSTEM seminar addict 1 2,378 22-10-2012, 02:29 PM
Last Post: seminar details
  PERFORMANCE APPRAISAL seminar addict 1 2,617 09-10-2012, 11:52 AM
Last Post: seminar details
  BLUETOOTH SECURITY ppt seminar paper 1 2,719 08-10-2012, 03:08 PM
Last Post: seminar details
  VIRTUAL DATABASE TECHNOLOGY FOR DISTRIBUTED DATABASE abstract seminar details 0 1,411 09-06-2012, 06:00 PM
Last Post: seminar details
  Computer Security Pretty Good Privacy seminar details 0 999 09-06-2012, 04:22 PM
Last Post: seminar details
  Power System Reliability Analysis with Distributed Generators seminar details 0 537 09-06-2012, 01:54 PM
Last Post: seminar details
  An Iris Recognition System to Enhance e-security seminar details 0 903 08-06-2012, 05:23 PM
Last Post: seminar details

Forum Jump: