期刊文献+

广域存储虚拟化的数据访问控制模型研究 被引量:4

Access control model of virtualized wide-area storage
下载PDF
导出
摘要 分析了传统的单域分布式存储服务中几种常用的访问控制模型 .针对广域存储虚拟化的需求 ,指出传统模型的不足之处 ,进而引出了存储服务点的概念 .提出通过使用存储服务点结合基于票据的访问控制的形式来实现广域范围类的单一用户身份认证并提高存储服务的效率 .在此基础上 。 After analyzing the traditional access control models in single-domain distributed storage system, the drawbacks of such models was pointed out when being used in multi-domain. The concept of storage service point (SSP) was introduced. Based on SSP, an access control model integrating SSP with ticket-based access control was given which can be used to implement single-sign-on and improve the efficiency of storage service in wide-area storage. By adding some entries specifically to normal access control list and using it along with ticket-based access control, the QoS of storage service was achieved.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2004年第1期38-40,共3页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家高技术研究发展计划资助项目 (2 0 0 1AA1110 11) 国家杰出青年科学基金资助项目 (6 0 12 5 2 0 8)
关键词 存储虚拟化 访问控制列表 单一认证 存储服务点 storage virtualization access control list single sign on storage service point
  • 相关文献

参考文献1

二级参考文献6

  • 1[1]I Foster, C Kesselman. The Grid: Blueprint for a Future Computing Infrastructure. San Francisco, USA: Morgan Kaufmann Publishers, 1999
  • 2[2]Wolfgang Hoschek, Javier Jaen-Martinez. Data management in an international data grid project. In: ACM Int'l Workshop on Grid Computing (Grid'2000). Bangalore, India, 2000. 17~20
  • 3[3]W Allcock, A Chervenak, I Foster et al. The data grid: Towards an architecture for the distributed management and analysis of large scientific datasets. Journal of Network and Computer Applications, 2000, 23(3): 187~200
  • 4[4]Bill Allcock, Ian Foster, Veronika Nefedova. High-performance remote access to climate simulation data: A challenge problem for data grid technologies. In: The Conf of High-Performance Networking and Computing, Denver SC'2001. USA, 2001. 283~297
  • 5[5]M Baldonado, C Chang, L Gravano et al. The stanford digital library metadata architecture. International Journal Digital Libraries, 1997, 1(2): 108~121
  • 6[6]Chaitanya Baru, Reagan Moore, Arcot Rajasekar et al. The SDSC storage resource broker. In: Proc CASCON'98 Conference. Toronto, Canada, 1998

共引文献106

同被引文献22

  • 1黄建忠,谢长生,曹强,罗东健.基于三方通信构架的可信任网络存储安全系统的研究[J].华中科技大学学报(自然科学版),2005,33(z1):158-160. 被引量:3
  • 2贾永洁,金海,易川江,韩宗芬,吴松.存储虚拟化系统的元数据副本一致性管理模型[J].计算机工程与科学,2004,26(9):86-88. 被引量:4
  • 3陆华,张世永,钟亦平.一个基于单密钥的对象存储安全机制设计[J].计算机工程,2005,31(7):148-150. 被引量:2
  • 4冯丹,史伟,覃灵军,关卿.基于对象存储系统的对象文件系统设计[J].华中科技大学学报(自然科学版),2006,34(12):47-49. 被引量:4
  • 5[1]Chervenak A,Foster I,Kesselman C,et al.The data grid:towards an architecture for the distributed management and analysis of large scientific datasets [J].Journal of Network and Computer Applications,2001,23(2):187-200
  • 6Saker K. An analysis of object storage architecture [J]. IEEE Computer, 2003, 25(3):23-36.
  • 7Kim M, Koc C K. Enhanced security for the modified authenticated key agreement scheme[J]. IJCSNS International Journal of Computer Science and Network Security, 2006, 6(7B): 164-169.
  • 8Gobioff H. Security for a high performance commodity storage subsystem[M]. Pittsburgh:Carnege Mellon University, 1999.
  • 9Menezes A. Elliptic curve public key cryptosystem[M]. Boston: Kluwer Academic Publishers, 1993.
  • 10Vanstone S A. Next generation security for wireless: elliptic curve cryptography[J]. Computers Security, 2003, 22(5):412-415.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部