Paper
15 September 2005 Security policy analysis in network-attached optical disk storage system
Author Affiliations +
Proceedings Volume 5966, Seventh International Symposium on Optical Storage (ISOS 2005); 59662D (2005) https://doi.org/10.1117/12.649837
Event: Seventh International Symposium on Optical Storage (ISOS 2005), 2005, Zhanjiang, China
Abstract
The network-attached optical disk storage system has the advantages of the network-attached storage system and the optical storage device. Due to the data reliability and the removability of the storage medium, this optical storage system is very effective on massive data providing and backup. Recently, achievements have been made in security models and policies in a distributed network system environment and the network-attached storage system environment. However, the relevant research is not enough in the network-attached optical disk storage system, especially in a network-attached optical disc device. So it is significant to analyze the security policy and setup a good security model for the network-attached optical disk storage system. This paper makes a theoretical analysis on the security policy in the network-attached optical disk storage system. Firstly, the difference of the network-attached optical disk storage system and the distributed network system environment is presented. The network-attached optical disk storage system is a special distributed network system, and to meet the requirements of the system security, we use the authentication and key exchange protocol method to decide who is authorized to have what access rights on which objects with respect to some security models and policies in compute system. Secondly, we compare the effect of several types of authentication and key distribution protocols in a distributed network system environment. Then we port these authentication and key exchange protocols on the network-attached optical disk storage system environment. Based on these analyses, this paper proposes a secure key management scheme for security services in the network-attached optical disk storage system over open networks. This scheme focuses on the framework for authentication and the centralized key management, and future work will focus on dynamic membership management.
© (2005) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jun Liu, Changsheng Xie, and Hao Huang "Security policy analysis in network-attached optical disk storage system", Proc. SPIE 5966, Seventh International Symposium on Optical Storage (ISOS 2005), 59662D (15 September 2005); https://doi.org/10.1117/12.649837
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Optical storage

Network security

Optical discs

Optical networks

Data storage

Distributed computing

Computer security

RELATED CONTENT


Back to Top