Design and Implementation of a Security Framework Based on the Object-Based Storage Device Standard | SpringerLink
Skip to main content

Design and Implementation of a Security Framework Based on the Object-Based Storage Device Standard

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3980))

Included in the following conference series:

Abstract

Recently, demands on security frameworks adopted for network-based storage mechanisms have considerably increased, as these mechanisms are appointed in important roles within industrial areas. However, there has been minimal research and development of these frameworks. In this paper, the design and implementation of a security framework, based on the Object-based Storage Device (OSD) standard [1], is presented. In the proposed security framework compared with the OSD standard, several different functionalities exist.

This research was supported by Electronics and Telecommunications Research Institute. This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. American National Standard for Information Technology, SCSI Object-Based Storage Device Commands (OSD), INCITS 400-2004 (2004)

    Google Scholar 

  2. Stanton, P.: Securing Data in Storage: A Review of Current Research, ACM Computing Research Repository (CoRR) Technical Report 0409034 (September 2004)

    Google Scholar 

  3. Gibson, G.A., Meter, R.V.: Network Attached Storage Architecture. Communications of The ACM 43(11) (November 2000)

    Google Scholar 

  4. Miller, E.L., Long, D.D.E., Freeman, W., Reed, B.: Strong security for distributed file systems. In: Proc. of the 20th IEEE International Performance, Computing and Communications Conference (IPCCC 2001), Phoenix, pp. 34–40 (April 2001)

    Google Scholar 

  5. Cluster File systems, Inc., Lustre: A Scalable, High-Performance File System, http://www.lustre.org/

  6. PANASAS, Inc., Panasas White Paper: Object Storage Architecture

    Google Scholar 

  7. IBM Haifa Laboratory, http://www.haifa.il.ibm.com/projects/storage/objectstore/

  8. Azagury, A., Dreizin, V., Factor, M., Henis, E., Naor, D., Rinetzky, N., Rodeh, O., Satran, J., Tavory, A., Yerushalmi, L.: Towards an Object Store. In: Proc. of the 20th IEEE Symposium on Mass Storage Systems (2003)

    Google Scholar 

  9. Factor, M., Meth, K., Naor, D., Rodeh, O., Satran, J.: Object Storage: The Future Building Block for Storage Systems. In: Proc. of the Second International IEEE Symposium on Emergence of Globally Distributed Data, pp. 101–105 (June 2005)

    Google Scholar 

  10. Satran, J., Meth, K., Sapuntzakis, C., Chadalapaka, M., Zeidner, E.: RFC 3720: Internet Small Computer Systems Interface (iSCSI) (April 2004)

    Google Scholar 

  11. Linux-iSCSI Project, http://linux-iscsi.sourceforge.net/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ko, K., Kim, G.S., Kim, J., Han, J., Kim, U., Eom, Y.I. (2006). Design and Implementation of a Security Framework Based on the Object-Based Storage Device Standard. In: Gavrilova, M., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3980. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751540_112

Download citation

  • DOI: https://doi.org/10.1007/11751540_112

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34070-6

  • Online ISBN: 978-3-540-34071-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics