SECURITY AND AUTHENTICATION FOR NETWORKED STORAGE

V. Kumar Murty, Guangwu Xu

Abstract

Authentication and access control are important measures for the security of a storage area network (SAN). In this paper, the current methods of authentication and access control in a SAN are reviewed and a new identity-based authentication scheme is proposed. This scheme has the advantage that it is lighter weight and more suited for the high speed switches that operate in a SAN fabric.

References

  1. Blake, I., Seroussi, G., and Smart, N. (2004). Advances in Elliptic Curve Cryptography. Cambridge University Press, London.
  2. Boneh, D. and Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in Cryptology, Crypt'01, LNCS, vol. 2139, pages 213-239. SpringerVerlag Heidelberg.
  3. Boneh, D., Shacham, H., and Lynn, B. (2004). Short signatures from the weil pairing. In J. of Cryptology, vol. 17, pages 297-319.
  4. Cha, J. C. and Cheon, J. H. (2003). An identity-based signature from gap diffie-hellman groups. In Public Key Cryptography, PKC'03, LNCS, vol. 2567, pages 18- 30. Springer-Verlag Heidelberg.
  5. Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In Proc. the 8th IMA International Conference on Cryptography and Coding, LNCS, vol. 2260, pages 360-363. Springer-Verlag Heidelberg.
  6. Feige, U., Fiat, A., and Shamir, A. (1988). Zero knowledge proof of identity. In J. of Cryptology, vol 1, pages 77- 94.
  7. Fiat, A. and Shamir, A. (1987). How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology, Crypto'86, LNCS, vol. 263, pages 186-194. Springer-Verlag Heidelberg.
  8. Garefalakis, T. and Mitchell, C. (2002). Securing personal area networks. In 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, pages 1257-1259.
  9. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in Cryptology, Crypto'84, LNCS, vol. 196, pages 47-53. Springer-Verlag Heidelberg.
Download


Paper Citation


in Harvard Style

Kumar Murty V. and Xu G. (2008). SECURITY AND AUTHENTICATION FOR NETWORKED STORAGE . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 477-480. DOI: 10.5220/0001927804770480


in Bibtex Style

@conference{secrypt08,
author={V. Kumar Murty and Guangwu Xu},
title={SECURITY AND AUTHENTICATION FOR NETWORKED STORAGE},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={477-480},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001927804770480},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - SECURITY AND AUTHENTICATION FOR NETWORKED STORAGE
SN - 978-989-8111-59-3
AU - Kumar Murty V.
AU - Xu G.
PY - 2008
SP - 477
EP - 480
DO - 10.5220/0001927804770480