Font Size: a A A

Study And Implementation Of Security Of Network Storage System Base On ISCSI

Posted on:2007-12-13Degree:MasterType:Thesis
Country:ChinaCandidate:G Q JiangFull Text:PDF
GTID:2178360182986607Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
iSCSI standard defined a kind of storage system based on TCP/IP network, which may construct storage area network by using current network infrastructures. Its transmitting subsystem, which is different from traditional SCSI system, is based on remote, unstable and insecure IP network. So its communication security and stability is very important.This paper studies the security problem of iSCSI system communication, which involves the stability problem, according to the iSCSI standard, and after that the following four problems needing solved were promoted: authentication, access control, data checksum and error recovery.At first a set of authentication methods were introduced, and through discussing their security problems and characteristics, an authentication method of iSCSI system based on SRP technology was put forward. After analyzing and designing the course of authentication, the implementation was presented. Furthermore, the iSCSI access control modal based on RBAC in which the role was considerd as system service, was given out by analyzing the operation and requirement of iSCSI system, and its database modal was constructed after studying the access control course. At last, the implementation scheme was discussed. For the iSCSI data checksum problem of CRC code, through mathematic deduction the formula of CRC coding with the unit of any bits and its computer algorithm were given, and experiment of iSCSI PDU showed that the performance of coding was advanced. In the end of this paper, the error classes, error recovery classes and the error recovery hierarchy were introduced, and we designed its class and function modal.
Keywords/Search Tags:iSCSI, Network Security, Authentication, Access Control, RBAC, CRC, iSCSI Error Recovery
PDF Full Text Request
Related items