Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically integrity, by focusing on integrating security into network storage system. Emphasizing the cost-constrained environment of storage, we examine how current software-based cryptography cannot support storage's Gigabit/sec transfer rates. To solve this problem, we introduce a novel message authentication code, based on stored message digests. This allows storage to deliver high-performance, a factor of five improvement in our prototype's integrity protected bandwidth, without hardware acceleration for common read operations. For receivers, where precomputation cannot be ...
Network-attached storage enables network-striped data transfers directly between client and storage ...
This paper presents a novel cryptographic capability system addressing the security and performance ...
[[abstract]]Object-based storage offloads some works of file systems to storage devices to improve s...
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to t...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
Outsourced storage has become more and more practical in recent years. Users can now store large amo...
A major security concern with outsourcing data storage to third-party providers is authenticating th...
This paper presents a novel cryptographic capability system addressing the security and performance ...
ABSTRACT Data integrity is a fundamental aspect of storage security and re-liability. With the adven...
As the computer and network evolved and linked with each other, so as the threats of security risks ...
We present an architecture for network authenticated disks that can be used to implement distributed...
Distributed storage codes have recently received a lot of attention in the community. Independently,...
We propose a practical and efficient method for adding security to network-attached disks (NADs). In...
Abstract—Network coding-based storage has recently received a lot of attention in the network coding...
The amount of data generated by scientific and commercial applications is growing at an ever-increas...
Network-attached storage enables network-striped data transfers directly between client and storage ...
This paper presents a novel cryptographic capability system addressing the security and performance ...
[[abstract]]Object-based storage offloads some works of file systems to storage devices to improve s...
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to t...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
Outsourced storage has become more and more practical in recent years. Users can now store large amo...
A major security concern with outsourcing data storage to third-party providers is authenticating th...
This paper presents a novel cryptographic capability system addressing the security and performance ...
ABSTRACT Data integrity is a fundamental aspect of storage security and re-liability. With the adven...
As the computer and network evolved and linked with each other, so as the threats of security risks ...
We present an architecture for network authenticated disks that can be used to implement distributed...
Distributed storage codes have recently received a lot of attention in the community. Independently,...
We propose a practical and efficient method for adding security to network-attached disks (NADs). In...
Abstract—Network coding-based storage has recently received a lot of attention in the network coding...
The amount of data generated by scientific and commercial applications is growing at an ever-increas...
Network-attached storage enables network-striped data transfers directly between client and storage ...
This paper presents a novel cryptographic capability system addressing the security and performance ...
[[abstract]]Object-based storage offloads some works of file systems to storage devices to improve s...