SECURITY AND AUTHENTICATION FOR NETWORKED STORAGE
V. Kumar Murty, Guangwu Xu
2008
Abstract
Authentication and access control are important measures for the security of a storage area network (SAN). In this paper, the current methods of authentication and access control in a SAN are reviewed and a new identity-based authentication scheme is proposed. This scheme has the advantage that it is lighter weight and more suited for the high speed switches that operate in a SAN fabric.
References
- Blake, I., Seroussi, G., and Smart, N. (2004). Advances in Elliptic Curve Cryptography. Cambridge University Press, London.
- Boneh, D. and Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in Cryptology, Crypt'01, LNCS, vol. 2139, pages 213-239. SpringerVerlag Heidelberg.
- Boneh, D., Shacham, H., and Lynn, B. (2004). Short signatures from the weil pairing. In J. of Cryptology, vol. 17, pages 297-319.
- Cha, J. C. and Cheon, J. H. (2003). An identity-based signature from gap diffie-hellman groups. In Public Key Cryptography, PKC'03, LNCS, vol. 2567, pages 18- 30. Springer-Verlag Heidelberg.
- Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In Proc. the 8th IMA International Conference on Cryptography and Coding, LNCS, vol. 2260, pages 360-363. Springer-Verlag Heidelberg.
- Feige, U., Fiat, A., and Shamir, A. (1988). Zero knowledge proof of identity. In J. of Cryptology, vol 1, pages 77- 94.
- Fiat, A. and Shamir, A. (1987). How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology, Crypto'86, LNCS, vol. 263, pages 186-194. Springer-Verlag Heidelberg.
- Garefalakis, T. and Mitchell, C. (2002). Securing personal area networks. In 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, pages 1257-1259.
- Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in Cryptology, Crypto'84, LNCS, vol. 196, pages 47-53. Springer-Verlag Heidelberg.
Paper Citation
in Harvard Style
Kumar Murty V. and Xu G. (2008). SECURITY AND AUTHENTICATION FOR NETWORKED STORAGE . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 477-480. DOI: 10.5220/0001927804770480
in Bibtex Style
@conference{secrypt08,
author={V. Kumar Murty and Guangwu Xu},
title={SECURITY AND AUTHENTICATION FOR NETWORKED STORAGE},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={477-480},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001927804770480},
isbn={978-989-8111-59-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - SECURITY AND AUTHENTICATION FOR NETWORKED STORAGE
SN - 978-989-8111-59-3
AU - Kumar Murty V.
AU - Xu G.
PY - 2008
SP - 477
EP - 480
DO - 10.5220/0001927804770480