{"title":"使用对象存储设备设计分布式文件系统时的安全考虑","authors":"B. Reed, Mark A. Smith, D. Diklic","doi":"10.1109/SISW.2002.1183507","DOIUrl":null,"url":null,"abstract":"We present the design goals that led us to developing a distributed object-based secure file system, Brave. Brave uses mutually authenticated object storage devices, SCARED, to store file system data. Rather than require a new authentication infrastructure. we show how we use a simple authentication protocol that is bridged into existing security infrastructures, even if there is more than one authentication protocol or domain present. We position our work in the context of some of the current work going on in distributed secure file systems and present our implementation of our file system. We also present some security weaknesses that are shared with other distributed file systems that may not be apparent when designing these systems.","PeriodicalId":183673,"journal":{"name":"First International IEEE Security in Storage Workshop, 2002. Proceedings.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"Security considerations when designing a distributed file system using object storage devices\",\"authors\":\"B. Reed, Mark A. Smith, D. Diklic\",\"doi\":\"10.1109/SISW.2002.1183507\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present the design goals that led us to developing a distributed object-based secure file system, Brave. Brave uses mutually authenticated object storage devices, SCARED, to store file system data. Rather than require a new authentication infrastructure. we show how we use a simple authentication protocol that is bridged into existing security infrastructures, even if there is more than one authentication protocol or domain present. We position our work in the context of some of the current work going on in distributed secure file systems and present our implementation of our file system. We also present some security weaknesses that are shared with other distributed file systems that may not be apparent when designing these systems.\",\"PeriodicalId\":183673,\"journal\":{\"name\":\"First International IEEE Security in Storage Workshop, 2002. Proceedings.\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"First International IEEE Security in Storage Workshop, 2002. Proceedings.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SISW.2002.1183507\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"First International IEEE Security in Storage Workshop, 2002. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SISW.2002.1183507","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security considerations when designing a distributed file system using object storage devices
We present the design goals that led us to developing a distributed object-based secure file system, Brave. Brave uses mutually authenticated object storage devices, SCARED, to store file system data. Rather than require a new authentication infrastructure. we show how we use a simple authentication protocol that is bridged into existing security infrastructures, even if there is more than one authentication protocol or domain present. We position our work in the context of some of the current work going on in distributed secure file systems and present our implementation of our file system. We also present some security weaknesses that are shared with other distributed file systems that may not be apparent when designing these systems.