期刊文献+

基于ECC的iSCSI-SAN安全模型设计 被引量:3

Design of Security Model of iSCSI-SAN Based on ECC
下载PDF
导出
摘要 具有带外存储虚拟化结构的iSCSI-SAN存在安全隐患:一方面,暴露在IP网络上的存储资源容易遭到假冒身份者的非法访问;另一方面,在网络上直接传输的明文存储数据面临着被网络攻击者监听的安全威胁。该文基于椭圆曲线密码体制ECC设计了适合该网络存储结构的安全模型,该模型通过提供双向认证机制防止假冒身份攻击,通过在认证过程中协商一次性会话密钥并对存储数据进行加密保证存储数据的传输安全,从而提高了存储系统的安全性。 iSCSI-SAN with out-band storage virtualization has some security hidden dangers: one is the storage resource exposed at IP network, which is vulnerable to forgery attack. The other one is the storage data transmitted on IP network, which faces the security threat of network sniffer. Based on ECC, a security model suited to above-mentioned network storage structure is designed, which provides two-side authentication to prevent forgery attack and encryption mechanism to ensure the security of storage data transmission. Consequently, the security of storage system is enhanced.
作者 刘明 苏锦海
出处 《计算机工程》 CAS CSCD 北大核心 2007年第18期170-171,175,共3页 Computer Engineering
关键词 ISCSI ECC SAN 网络存储 存储虚拟化 iSCSI ECC SAN network storage storage virtualization
  • 相关文献

参考文献4

  • 1iSCSI Protocol Concepts and Implementation[EB/OL].(2001-09).http://www.cisco.corn.
  • 2Clark T.Designing Storage Area Networks:A Practical Reference for Implementing Fibre Channel and IP SANs[M].[S.l.]:AddisonWesley Professional,2003.
  • 3Diffie W,Hellman W E.New Direction Cryptography[J].IEEE Trans.on Information Theory,1976,22(11):644-654.
  • 4Menezes A.Elliptic Curve Public Key Cryptosystems[M].Boston:K1uwer Academic Publishers,1993.

同被引文献15

  • 1姚玉坤,黄伟,杜宁.iSCSI协议的仿真实现[J].计算机工程,2007,33(8):241-243. 被引量:3
  • 2陈晓玲,张争.基于IPSec的iSCSI安全设计与实现[J].湖南科技学院学报,2007,28(4):42-44. 被引量:1
  • 3Feng Dan,Jin Hai,Zhang Jiangling.Performance Analysis of RAID for Different Communication Mechanism Between RAID Controller and String Controllers[J].IEEE Trans.on Magnetics,1996,32(5):3890-3892.
  • 4Feng Dan, Jin Hai, Zhang Jiang-ling. Performance Analysis of RAID for Different Communication Mechanism Between RAID Controller and String Controllers [J].IEEE Trans. on Magnetics,1996, 32(5): 3890-3892.
  • 5Miehael RLyu,Veena BMendiratta. Software Fault Tolerance in a Clustered Architecture: Techniques and Reliability Modeling[J]. Proceedings of the 1999 IEEE Aerospace Conference, 1999(5):141-150.
  • 6Campelo J C. Distributed Industrial Control System s: a Faultto Lerant Architecture [J]. Microprocessors and Micro Systems, 1999,23(2):103-112.
  • 7Kimberly Keeton, Cipriano Santos, Disk Beyer. Designing for Disasters. File and Storage Technologies (FAST),59 -72, February 2004.
  • 8余胜生,季文彬,周敬利,曾东.一种iSCSI存储管理系统的研究与实现[J].计算机工程,2007,33(23):258-260. 被引量:5
  • 9http://zh.wikipedia.org/wiki/%E7%A4%BE%E4%BA%A4%E7%B6%B2%E8%B7%AF .
  • 10Cisco systems.iSCSI Protol Concepts and Implem-entation[]..

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部