Analysis Of A Security Protocol In A Cluster Storage System
Free (open access)
61 - 71
A. K. M. Nazmus Sakib & M. Nijim
This paper represents a review of security vulnerabilities in a cluster storage system. In particular, we focus on identifying the different network level vulnerabilities including attack on the authentication, key exchange and data transfer protocol. We provide a brief description of the different functional entities and we investigate several technical issues including infrastructure and aspects related to the security of the existing system. This paper proposes a secure authentication technique for the network layer of DAS, SAN and NAS. We also bring unencrypted data communication under an encryption process. We implement the concept of shared key by using a one way chain algorithm for block transfer of data. We integrate a new protocol to maintain the level of security according to the data priority concept. Keywords: cluster, authentication, hash chain, time stamp.
Keywords: cluster, authentication, hash chain, time stamp.