WIT Press


Analysis Of A Security Protocol In A Cluster Storage System

Price

Free (open access)

Volume

45

Pages

11

Page Range

61 - 71

Published

2013

Size

220 kb

Paper DOI

10.2495/DATA130061

Copyright

WIT Press

Author(s)

A. K. M. Nazmus Sakib & M. Nijim

Abstract

This paper represents a review of security vulnerabilities in a cluster storage system. In particular, we focus on identifying the different network level vulnerabilities including attack on the authentication, key exchange and data transfer protocol. We provide a brief description of the different functional entities and we investigate several technical issues including infrastructure and aspects related to the security of the existing system. This paper proposes a secure authentication technique for the network layer of DAS, SAN and NAS. We also bring unencrypted data communication under an encryption process. We implement the concept of shared key by using a one way chain algorithm for block transfer of data. We integrate a new protocol to maintain the level of security according to the data priority concept. Keywords: cluster, authentication, hash chain, time stamp.

Keywords

Keywords: cluster, authentication, hash chain, time stamp.