INTEGRITY AND PRIVACY IN AUTHENTICATED KEY EXCHANGE PROTOCOL FOR PARALLEL NETWORK FILE SYSTEM
Keywords:key escrow, network file systems, authenticated key exchange, Parallel sessions, forward secrecy
The problem of key establishment for secure many-to-many intercommunications is inspired because of proliferation/spread of large distributed file systems supporting parallel access to several storage devices. The current Internet standard is main focusing area for such file systems, which use Kerberos to establish parallel session keys between clients and storage devices. After reviewing of the existing Kerberos-based protocol shows that it has a number of limitations: (i) a metadata server providing key exchange between the clients and the storage devises (ii) the protocol does not provide forward secrecy for communication (iii) the metadata server generates, all the session keys that are used between the storage devices and clients and this inherently leads to key escrow. Key exchange protocols that are propose to address above mentioned/described issues. We show that this protocol is capable of reducing up to approximately more than 50% of the workload of the metadata server and concurrently supporting escrow-freeness and Forward secrecy. This requires only a small fraction of raised computation overhead at the user.
C. Adams. The simple public-key GSS-API mechanism (SPKM). The
Internet Engineering Task Force (IETF), RFC 2025, Oct 1996.
A. Adya, W.J. Bolosky, M. Castro, G. Cermak, R. Chaiken,
J.R. Douceur, J. Howell, J.R. Lorch, M. Theimer, and R. Wattenhofer.
FARSITE: Federated, available, and reliable storage for an incompletely
trusted environment. In Proceedings of the 5th Symposium on Operating
System Design and Implementation (OSDI). USENIX Association, Dec
M.K. Aguilera, M. Ji, M. Lillibridge, J. MacCormick, E. Oertli,
D.G. Andersen, M. Burrows, T. Mann, and C.A. Thekkath. Blocklevel
security for network-attached disks. In Proceedings of the 2nd
International Conference on File and Storage Technologies (FAST).
USENIX Association, Mar 2003.
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski,
G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A view
of cloud computing. Communications of the ACM, 53(4):50–58. ACM
Press, Apr 2010.
Mr.Shirsath Kirankumar Vilas(Computer Engineer),
Author of “SELF ADDPTIVE SYMANTIC FOCUSED CROWLER FOR INFORMATION DISCOVERY AND DATA MINING”
How to Cite
Copyright (c) 2021 International Education and Research Journal (IERJ)
This work is licensed under a Creative Commons Attribution 4.0 International License.