This paper represents a review of security vulnerabilities in a cluster storage system. In particular, we focus on identifying the different network level vulnerabilities including attack on the authentication, key exchange and data transfer protocol. We provide a brief description of the different functional entities and we investigate several technical issues including infrastructure and aspects related to the security of the existing system. This paper proposes a secure authentication technique for the network layer of DAS, SAN and NAS. We also bring unencrypted data communication under an encryption process. We implement the concept of shared key by using a one way chain algorithm for block transfer of data. We integrate a new protocol ...
Paper presented to the 3rd Annual Symposium on Graduate Research and Scholarly Projects (GRASP) held...
A mobile ad hoc network is a short-lived cooperative collection of mobile nodes that communicate wit...
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to t...
Cluster computing opens a new horizon for executing large-scale science, engineering and commercial ...
number of domains: academic, research, and industrial environments. At the same time, these clusters...
Due to growing the number of Information Technology (IT) users all around the world, consequently th...
Abstract. Large-scale commodity cluster systems are finding increasing deployment in academic, resea...
Abstract- The paper presents the vulnerabilities of cloud storage and various possible attacks explo...
Storage networking technology has enjoyed strong growth in recent years, but security concerns and t...
This paper considers the security issue of practical distributed storage systems (DSSs) which consis...
Abstract:we propose a secure communication protocol for communication between two nodes in ad hoc ne...
This paper investigates interplay among storage overhead, bandwidth requirement, and security constr...
This paper is aim to propose a data-origin authentication protocol based on ONOS cluster. ONOS is a ...
Abstract — Wireless Sensor Networks are less used because of lack of good security mechanism, need t...
With the increasing use of clusters and distributed networks in industry, research, and scientific d...
Paper presented to the 3rd Annual Symposium on Graduate Research and Scholarly Projects (GRASP) held...
A mobile ad hoc network is a short-lived cooperative collection of mobile nodes that communicate wit...
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to t...
Cluster computing opens a new horizon for executing large-scale science, engineering and commercial ...
number of domains: academic, research, and industrial environments. At the same time, these clusters...
Due to growing the number of Information Technology (IT) users all around the world, consequently th...
Abstract. Large-scale commodity cluster systems are finding increasing deployment in academic, resea...
Abstract- The paper presents the vulnerabilities of cloud storage and various possible attacks explo...
Storage networking technology has enjoyed strong growth in recent years, but security concerns and t...
This paper considers the security issue of practical distributed storage systems (DSSs) which consis...
Abstract:we propose a secure communication protocol for communication between two nodes in ad hoc ne...
This paper investigates interplay among storage overhead, bandwidth requirement, and security constr...
This paper is aim to propose a data-origin authentication protocol based on ONOS cluster. ONOS is a ...
Abstract — Wireless Sensor Networks are less used because of lack of good security mechanism, need t...
With the increasing use of clusters and distributed networks in industry, research, and scientific d...
Paper presented to the 3rd Annual Symposium on Graduate Research and Scholarly Projects (GRASP) held...
A mobile ad hoc network is a short-lived cooperative collection of mobile nodes that communicate wit...
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to t...