Font Size: a A A

Research And Implementation Of The Security Model For Object-Based Storage System

Posted on:2007-05-19Degree:MasterType:Thesis
Country:ChinaCandidate:J J ZhaoFull Text:PDF
GTID:2178360185486852Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The requirements for mass storage technology become more and more high by the application system. The classical storage system, such as block based SAN and file based NAS, has lacked the ability to do what they would like. But the new advent of the network storage technology accessed based on object receive more and more welcome from many applications, for its high performance, high scalability, being easy to manage and cross platform sharing. However, the current applications propose a higher request to the security of the network storage. The object-based storage storage has only provided the access control mechanism based on object attribute merely, and has not been able to consider its whole security from the system angle.Analyzing the network storage technology based on object deeply,we find the existing secure question and secure mechanisms it can provide. So we proposed a new kind of security model for object-based storage system, which provids the wholesale solution for the overall security problem of network storage system from the system angle. The model is implemented in lustre filesystem which is an opening source code. Then we test the model and make comparison. Main work as follows:(1) Researching and analyzing the background , the present development situation and the security requirements of the network storage technology, We point out the necessity of research. Analyzing the recent research situation of storage security, we points out the existing problems and the questions needed to be studied furtherly.(2) Security model for object-based storage system is been proposed, and associated secure protocols is designed. Aiming at architecture feature of the object-based storage system and the safety threat it will probably suffer, we analyze the safeness of the protocols. And then we make the qualitative analysis on the security model. Through comparing with the correlated work, the results show that this model has advantages over others of the strong security.(3) A lightweight changeable key object file encryption algorithm, suitable for...
Keywords/Search Tags:security model, network storage security, DAS, NAS, SAN, OSD
PDF Full Text Request
Related items