Advances the Forward Security in Parallel Network File System using An Efficient and Reliable Key Exchange Protocols

Kona H S Venkat Vinay, K Prameela

Abstract


In parallel file system we can disperse data over numerous nodes to permit simultaneous access by various errands of a parallel application. By play out the numerous errands in a parallel system is commonly to reduce execution and solid access to substantial data sets. In this work, we research the issue of secure many to numerous correspondences in substantial scale network file systems that bolster parallel access to different storage devices. That is, we consider a correspondence model where there are countless getting to various remote and conveyed storage devices in parallel. Especially, we concentrate on the most proficient method to trade key materials and set up parallel secure sessions between the clients and the storage devices in the parallel Network File System the present Internet standard in a productive and versatile way. In this paper we are proposed convention for performing key trade and furthermore build up parallel secure session amongst clients and storage devices. In this paper we are likewise proposed another idea for encryption and decoding of put away data. By actualizing this procedure we are utilizing mixture encryption and decoding calculation. By actualizing those ideas we can enhance execution of network and furthermore give greater security of put away data in the put away devices.


Keywords


Parallel sessions, Authenticated Exchange, Network file systems, forward secrecy and key escrow.

References


Hoon Wei Lim and Guomin Yang, “Authenticated Key Exchange Protocols for Parallel Network File Systems” in vol. 27, no. 1, Jan. 2016

M. Abd-El-Malek, W. V. Courtright II, C. Cranor, E. Thereska, M. Wachs, and J. J. Wylie, “Ursa minor: Versatile cluster-based storage,” in Proc. 4th USENIX Conf. File Storage Technol., Dec. 2005,pp. 59–72.

A. Adya, W. J. Bolosky, M. Castro, G. Cermak, M. Theimer, and R. Wattenhofer, “FARSITE: Federated, available, and reliable storage for an incompletely trusted environment,” in Proc. 5th Symp. Oper. Syst. Des.Implementation, Dec. 2002, pp. 1–14.

M. K. Aguilera, M. Ji, M. Lillibridge, T. Mann, and C. A. Thekkath, “Block-level security for network-attached disks,” in Proc. 2nd Int. Conf. File Storage Technol., Mar. 2003, pp. 159–174.

A. W. Leung, E. L. Miller, and S. Jones, “Scalable security for petascale parallel file systems,” in Proc. ACM/IEEE Conf. High Perform. Netw. Comput., Nov. 2007, p. 16.

J. Kubiatowicz, D. Bindel, Y. Chen, and B. Y. Zhao, “OceanStore: An architecture for global scale persistent storage,” in Proc. 9th Int. Conf. Arch. Support Program. Language Oper. Syst., Nov. 2000, pp. 190–201.

M. Bellare, D. Pointcheval, and P. Rogaway, “Authenticated key exchange secure against dictionary attacks,” in Proc. 19th Int. Conf. Theory Appl. Cryptographic Techn., May 2000, pp. 139– 155.

D. Boneh, C. Gentry, and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys,” in Proc. 25th Annu. Int. Conf. Adv. Cryptol., Aug. 2005, pp. 258–275.

B. Callaghan, B. Pawlowski, and P. Staubach, “NFS version 3 protocol specification,“ Internet Eng. Task Force (IETF), RFC 1813,Jun. 1995.

F. Hupfeld, T. Cortes, B. Kolbeck, J. Stender, J.Malo, J. Marti, and E. Cesario, “The XtreemFS architecture—A case for object-based file systems in grids,” Concurrency Comput.: Prac. Exp., vol. 20, no. 17, pp. 2049–2060, Dec. 2008.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.