Skip to main content

Integrity and performance in network attached storage

  • V Network
  • Conference paper
  • First Online:
High Performance Computing (ISHPC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1615))

Included in the following conference series:

Abstract

Computer security is of growing importance in the increasingly networked computing environment. This work examines the issue of high-performance network security, specifically integrity, by focusing on integrating security into network storage system. Emphasizing the cost-constrained environment of storage, we examine how current software-based cryptography cannot support storage's Gigabit/sec transfer rates. To solve this problem, we introduce a novel message authentication code, based on stored message digests. This allows storage to deliver high-performance, a factor of five improvement in our prototype's integrity protected bandwidth, without hardware acceleration for common read operations. For receivers, where precomputation cannot be done, we outline an inline message authentication code that minimizes buffering requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Advance Encryption Standard, http//www.nist.gov/aes

    Google Scholar 

  2. Anderson, R. and Biham, E. “Tiger: A Fast New Hash Function” Proceedings of the Third Workshop on Fast Software Encryption, 1996. Published as Lecture Notes in Computer Science-1039, Springer-Verlag.

    Google Scholar 

  3. Bellare, M., Canetti, R., and Krawczyk, H., “Keying Hash Functions for Message Authentication”, Advances in Cryptology: Crypto '96 Proceedings, Springer-Verlag, 1996.

    Google Scholar 

  4. Bellare, M., Guerin, R., and Rogaway, P., “XOR MACs: New methods for message authentication using finite pseudorandom functions”. Advances in Cryptology: Crypto '95 Proceedings, Springer-Verlag, 1995

    Google Scholar 

  5. Federal Information Processing Standard Publication 180-1, “Secure Hash Standard”, April 1995.

    Google Scholar 

  6. Federal Information Processing Standards Publication 46-3 (draft), “Data Encryption Standard”, January 15th, 1999.

    Google Scholar 

  7. Fibre Channel Association, http://www.fibrechannel.com

    Google Scholar 

  8. HiFn 7711 Data Sheet, http://www.hifn.com

    Google Scholar 

  9. Gibson, G., Nagle, D., Amiri, K., Chang, F., Feinberg, E., Gobioff, H., Lee, C., Ozceri, B., Riedel, E., Rochberg, D., Zelenka, J. “File Server Scaling with Network-Attached Secure Disks”. Proceedings of the SIGMETRICS 1997. June, 1997.

    Google Scholar 

  10. Gibson, G., Nagle, D., Amiri, K., Butler, J., Chang, F., Gobioff, H., Hardin, C., Riedel, E., Rochberg, D., Zelenka, J. “A Cost-Effective, High-Bandwidth Storage Architecture”, Proceedings of SPLOS VIII, 1998.

    Google Scholar 

  11. Gobioff, H., Gibson, G., Tygar, J.D., “Security for Network Attached Storage Devices”, Technical Report CMU-CS-97-185, 1997.

    Google Scholar 

  12. Kaashoek, M. F., Engler, D. R., Ganger, G. R., Wallach, D. A., “Server Operating Systems”, 1996 SIGOPS European Workshop. Connemara, Ireland, 1996.

    Google Scholar 

  13. McKusick, M.K. et al., A Fast File System for UNIX, ACM TOCS 2, August 1984.

    Google Scholar 

  14. Prencel, B., Rijmen, V., Bosselaers, A., “Principles and Performance of Cryptographic Algorithms”, Dr. Dobb's Journal, December, 1998.

    Google Scholar 

  15. Rivest, R., “The MD5 Message-Digest Algorithm,” RFC 1321, Apr. 1992.

    Google Scholar 

  16. Schneier, Bruce, Applied Cryptography, John Wiley & Sons, Inc. 1998

    Google Scholar 

  17. Smith, S., Weingart, S., “Building a High-Performance, Progammable Secure Coprocesor”. IBM Research Report RC 21102, February 1998.

    Google Scholar 

  18. Yee, B. Tygar, J.D., “Secure coprocessors in electronic commerce applications”. Proceedings of the 1st USENIX Workshop on Electronic Commerce. July 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Constantine Polychronopoulos Kazuki Joe Akira Fukuda Shinji Tomita

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gobioff, H., Nagle, D., Gibson, G. (1999). Integrity and performance in network attached storage. In: Polychronopoulos, C., Fukuda, K.J.A., Tomita, S. (eds) High Performance Computing. ISHPC 1999. Lecture Notes in Computer Science, vol 1615. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0094926

Download citation

  • DOI: https://doi.org/10.1007/BFb0094926

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65969-3

  • Online ISBN: 978-3-540-48821-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics