Font Size: a A A

Security Technology Research And Realization ON WAN Storage Services

Posted on:2009-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2178360275471858Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid development of network technology, the amount of network information transmission grows rapidly. The traditional wide-area network storage in the security services have been unable to meet the need.Especially,the arrival of the next generation Internet era of security has made new demands to the security on the file storage services of wide-area network.Security technology research is essential for improving security, reliability and availability of the on the WAN storage services.From the application-oriented perspective, the safety programme is presented to improve the quality of security of the WAN file storage services.Through the typical analysis of the existing security technology , the security system of a wide-area network storage services is presented.First of all, the key security technology of the network storage is analyzed. The security systems of the WAN storage services include identity authentication technology, user access control and confidential transmission. There is an analysis on a variety of security technology. Secondly, the choices are based on the analysis of the various security technologies. The portable system interface of the security system is JAAS (Java authentication and authorization services). The authentication module is used the Kerberos protocol.The authorization module is based on the role-based access control. The transmission of confidential data is used SSL (Secure Sockets Layer protocol). The data files are stored by the XML database. Thirdly, the choice of security technology is improved. Finally, a security system of the wide area network storage services is integrated by the aboved technology.In the security scheme on the WAN network storage services, the configuration files is changed without modifying the code.They can reflect the changes in the security management system, This makes WAN of the security system more flexible, adaptive and more in need with the security of the WAN network storage services.
Keywords/Search Tags:Network storage, Security strategy, Authentication, Authorization
PDF Full Text Request
Related items