Security in Storage Networks A Current Perspective

Size: px
Start display at page:

Download "Security in Storage Networks A Current Perspective"

Transcription

1 Security in Storage Networks A Current Perspective Christian Cachin <cca@zurich.ibm.com> ZISC Colloquium

2 Overview Networked storage systems NAS, SAN, OBS Design options for security data in flight & data at rest SAN filesystems Cryptographic SAN filesystem Summary 2 ZISC Colloquium 2004 IBM Corporation

3 Traditional Storage Systems app fs inode blk hba Direct-attached Storage 3 ZISC Colloquium 2004 IBM Corporation

4 Networked Storage Systems: NAS, OBS, SAN app app app fs fs fs fs inode inode inode inode NFS, CIFS (TCP/IP) blk hba OBS Protocol blk hba blk blk hba FC, iscsi NAS (Network-attached Storage) Object Storage (OBS, proposed to SNIA ) SAN (Storage-area Network) 4 ZISC Colloquium 2004 IBM Corporation

5 Network-based Storage Devices File server - read & write data in file - create & destroy file - directory operations - file/dir-based access control - space allocation - backup ops Object storage dev. - read & write bytes in object - create & destroy object -- - object-level access control - space allocation - backup ops Block device - read & write blocks device-level access control ZISC Colloquium 2004 IBM Corporation

6 Security in Networked Storage Systems Existing technology offers little protection Server room only Trusted storage providers, works, and clients Coarse-grained access control Security is needed Storage as a commodity Networked storage to desktop (iscsi) Threats - physical access to disks - access to work - authorized machines - unauthorized machines 6 ZISC Colloquium 2004 IBM Corporation

7 Security Toolbox Goals Confidentiality (no unauthorized access) Integrity (no unauthorized modification) Availability Mechanisms Encryption Confidentiality based on shared key k E k E k Message-authentication code (MAC) Integrity based on shared key k M k M k Hashing and digital signatures Integrity, w.r.t. reference value v H v Access control Confidentiality, integrity, availability Any mechanism on any layer, and in combination with others. 7 ZISC Colloquium 2004 IBM Corporation

8 Two Options for a Security Design 1) Protect the work - data in flight app... fs/obj/blk fs/obj/blk... hba 8 ZISC Colloquium 2004 IBM Corporation

9 Two Options for a Security Design 1) Protect the work - data in flight app... fs/obj/blk fs/obj/blk 2) Protect the data path - data at rest... hba 9 ZISC Colloquium 2004 IBM Corporation

10 Protecting Data in Flight Security in work/transport layer IPSEC, secure RPC... app... Access control on corresponding storage layer fs/obj/blk fs/obj/blk NAS at filesystem layer M E E M... AFS, NFSv4 hba ObjectStore at object layer NASD [Gibson et al./cmu], ObjectStore [Azagury et al./ibm] SAN at block layer Snapdragon [Aguilera et al./hp SRC] 10 ZISC Colloquium 2004 IBM Corporation

11 Protecting Data in Flight: Object Storage Link security on SAN - secure channel established by admin Protects data in flight Decrypts data on storage side admin Protection of object access at storage device client M E E M - access control through credentials - (cryptographic) capabilities by admin No unauthorized actions on data Requires new storage interface 11 ZISC Colloquium 2004 IBM Corporation

12 Protecting Data at Rest Encryption Integrity verification Access control Depending on storage layer: Cryptographic filesystems app fs/obj/blk cfs [Blaze], cepheus [Fu/MIT], SFS [Mazières et al./ MIT&NYU], EFS [W2k] & rest of the talk!... M E fs/obj/blk... hba Cryptographic Object Storage SAN encryption Security applicances [Decru, NeoScale, KastenChase] 12 ZISC Colloquium 2004 IBM Corporation

13 Protecting Data at Rest Encryption: keys? separate security admin server encrypted with user/group public key held by hardware module Integrity verification: reference values? integrated in directory inode tree is hash tree app... M E fs/obj/blk digital signatures under user/group public-key Access control: credentials? separate security admin server (Kerberos, ObjStore admin) fs/obj/blk... hba 13 ZISC Colloquium 2004 IBM Corporation

14 Protecting Data at Rest: A Cryptographic SAN Filesystem 14 ZISC Colloquium 2004 IBM Corporation

15 Protecting Data at Rest: A Cryptographic SAN Filesystem SAN today: Clients access block storage devices directly Fibre Channel (SCSI) Static configuration OS sees a local block storage device Static access control zoning & fencing in FC switch Inside server room only client client SAN 15 ZISC Colloquium 2004 IBM Corporation

16 SAN Filesystems (e.g. IBM's StorageTank) Virtualized block storage space Block access managed by metadata server (MDS) Single filesystem name space Heterogeneous clients Un*x client app vfs W2k client app vfs metadata blk blk LAN MDS (clustered) SAN 16 ZISC Colloquium 2004 IBM Corporation

17 Design of a Cryptographic SAN Filesystem Integrity verification & encryption in client Scalable End-to-end security MDS is trusted, provides encryption keys & reference data Integrate key management with metadata No modification of storage interface Needs secure LAN connection MDS LAN client H E client H E SAN 17 ZISC Colloquium 2004 IBM Corporation

18 Confidentiality Protection Data is encrypted on client Data encrypted in flight and at rest Metadata server holds keys, one key per file/object Selective, fine-grained activation Storage interface unmodified Impossible to prevent overwrites AES (e.g.) MDS client E k client E k SAN NIST standard (2001), fast & secure ~ 80MByte/s in software (Xeon 3GHz) Key evolution Fresh key on data rewrite 18 ZISC Colloquium 2004 IBM Corporation

19 Key Evolution in Cryptographic Filesystems Knowledge of Key = Access to data Key revocation & key evolution Grant access Hand out key Revoke access Change key... expensive! Re-encrypt complete file with fresh key Do nothing as long as no data is written Fresh key for freshly written data 19 ZISC Colloquium 2004 IBM Corporation

20 Integrity Protection Data is hashed on client to digest values Digest values stored at MDS Secure transfer of digests Integrity protected in flight and at rest, modifications are detected Storage interface unmodified Impossible to prevent overwrites, but violations are detected SHA-1, SHA-256 or others MDS v H v H SAN NIST standards, fast & secure ~ 260 MByte/s in software (Xeon 3GHz) Granularity? Incremental updates? Design alternatives 20 ZISC Colloquium 2004 IBM Corporation

21 Integrity Protection: Design Alternatives Assumption: MDS trusted Design 1: Digests of all files stored by MDS + Simple + Little storage overhead at MDS (SHA-256: 32 bytes per file) Updates require recalculation of digest, work proportional to file length Integrity can only be verified after entire file has been processed; partial reads inefficient Design 2: Digests stored by MDS, using incremental hashing + Almost as simple as Design 1 + Incremental updates, work independent of file length + Little storage overhead at MDS (SHA-256: 32 bytes per file) Integrity can only be verified after entire file has been processed; partial reads inefficient Somewhat slower than Design 1 21 ZISC Colloquium 2004 IBM Corporation

22 Integrity Protection: Design Alternatives (2) root Design 3: Hash tree [Merkle], stored by MDS + Incremental updates with logarithmic work + Verification of partial reads Storage and data transfer overhead at MDS (linear in file size / degree of tree) H H H H H H H H H H H H H H H H H H H Design 4 (choice): Hash tree, tree stored on SAN, root by MDS + All advantages of above + Almost no overhead at MDS + Extensible to NFSv4 named attributes or NTFS streams 22 ZISC Colloquium 2004 IBM Corporation

23 Integrity Protection with Author Attestation User signs file data Implementation on top of hash tree by signing root Provides partial audit trail (last writer) Reference storage Data retention allows full audit trail Key management requires a public-key infrastructure Associate keys with file system users Use existing PKI (PGP, X.509) Keys and certificates managed by clients MDS only storages keys, needs not be trusted 23 ZISC Colloquium 2004 IBM Corporation

24 Comparing the Two Options Protecting data in flight + well-established work security tools + access control at storage device stored data is not encrypted / verified needs new storage device interfaces Protecting data at rest new mechanisms no prevention of overwrites + end-to-end security for stored data (data in flight & at rest) + scalable, data is encrypted / verified only once + transparent to storage device Combination is possible in particular when implemented at different layers 24 ZISC Colloquium 2004 IBM Corporation

25 Summary Networked storage systems NAS, ObjectStore, SAN Design options for security Protecting data in flight Protecting data at rest Recent trends ObjectStore Cryptographic SAN Filesystems 25 ZISC Colloquium 2004 IBM Corporation

26 Thank you! More information? 26 ZISC Colloquium 2004 IBM Corporation

Strong Security for Distributed File Systems

Strong Security for Distributed File Systems Strong Security for Distributed File Systems Ethan Miller Darrell Long William Freeman Benjamin Reed University of California, Santa CruzTRW IBM Research Abstract We have developed a scheme to secure networkattached

More information

Secure File System. Jim Hughes, Storage Technology Corporation. Chris Feist, Steve Hawkinson, Jeff Perrault, Matthew O Keefe, University of Minnesota

Secure File System. Jim Hughes, Storage Technology Corporation. Chris Feist, Steve Hawkinson, Jeff Perrault, Matthew O Keefe, University of Minnesota Secure File System Jim Hughes, Storage Technology Corporation Chris Feist, Steve Hawkinson, Jeff Perrault, Matthew O Keefe, University of Minnesota David Corcoran, Purdue University mailto:sfs@securefilesystem.org

More information

Plutus: scalable secure file sharing on untrusted storage

Plutus: scalable secure file sharing on untrusted storage Plutus: scalable secure file sharing on untrusted storage Mahesh Kallahalla HP Labs Joint work with Erik Riedel (Seagate Research), Ram Swaminathan (HP Labs), Qian Wang (Penn State), Kevin Fu (MIT) March

More information

storage elements and computer systems so that data transfer is secure and robust."

storage elements and computer systems so that data transfer is secure and robust. Storage Architecture Choice, SAN or NAS LaNet Merrill SGI SAN & HA Product Marketing Manager storage elements and computer systems so that data transfer is secure and robust." Unlike the traditional direct-attach

More information

Secure Backup and Recovery Whitepaper. Securing Data in Backup and Disaster Recovery Sites with Decru DataFort Appliances

Secure Backup and Recovery Whitepaper. Securing Data in Backup and Disaster Recovery Sites with Decru DataFort Appliances Secure Backup and Recovery Whitepaper Securing Data in Backup and Disaster Recovery Sites with Decru DataFort Appliances September 2005 Introduction... 2 Decru DataFort Storage Security Appliances... 2

More information

Saving Private Data An Introduction to Storage Security Richard Austin, MS, CISSP, MCSE

Saving Private Data An Introduction to Storage Security Richard Austin, MS, CISSP, MCSE Saving Private Data An Introduction to Storage Security Richard Austin, MS, CISSP, MCSE SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

Securing Networked Storage: Decru DataFort Appliance

Securing Networked Storage: Decru DataFort Appliance Securing Networked Storage: Decru DataFort Appliance Contents 1. Executive Summary 2. Trends in Data Security and Privacy 3. Current Approaches 4. Decru DataFort Security Appliance 5. Backup, Mirroring

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

DAS to SAN Migration Using a Storage Concentrator

DAS to SAN Migration Using a Storage Concentrator DAS to SAN Migration Using a Storage Concentrator April 2006 All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc. which are subject to

More information

UNDERSTANDING DATA DEDUPLICATION. Thomas Rivera SEPATON

UNDERSTANDING DATA DEDUPLICATION. Thomas Rivera SEPATON UNDERSTANDING DATA DEDUPLICATION Thomas Rivera SEPATON SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

More information

Architecture of the Secure File System

Architecture of the Secure File System Architecture of the Secure File System James P. Hughes Storage Technology Corporation jim@network.com Christopher J. Feist Storage Technology Corporation chris.feist@network.com October 23, 2000 Abstract

More information

Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center

Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center Samir Sharma, Juniper Networks Author: Samir Sharma, Juniper Networks SNIA Legal Notice The material contained in this

More information

SECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS. Litiano Piccin (NCDA-NCIE/SAN) litiano@studiopiccin.it

SECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS. Litiano Piccin (NCDA-NCIE/SAN) litiano@studiopiccin.it SECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS Litiano Piccin (NCDA-NCIE/SAN) litiano@studiopiccin.it 1. Introduction: SAN vs NAS. 2. SAN. 3. NAS. 4. SNAPSHOT. 5. Data Acquisition. INTRODUCTION STORAGE:

More information

UNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard

UNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard UNDERSTANDING DATA DEDUPLICATION Tom Sas Hewlett-Packard SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

More information

UNDERSTANDING DATA DEDUPLICATION. Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s.

UNDERSTANDING DATA DEDUPLICATION. Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s. UNDERSTANDING DATA DEDUPLICATION Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual

More information

Data Storage at IBT. Topics. Storage, Concepts and Guidelines

Data Storage at IBT. Topics. Storage, Concepts and Guidelines Data Storage at IBT Storage, Concepts and Guidelines Topics Hard Disk Drives (HDDs) Storage Technology New Storage Hardware at IBT Concepts and Guidelines? 2 1 Hard Disk Drives (HDDs) First hard disk:

More information

Storage Networking Overview

Storage Networking Overview Networking Overview iscsi Attached LAN Networking SAN NAS Gateway NAS Attached SAN Attached IBM Total Module Flow Business Challenges Networking Trends and Directions What is Networking? Technological

More information

Regulatory Compliance Solutions for Security and Privacy

Regulatory Compliance Solutions for Security and Privacy Regulatory Compliance Solutions for Security and Privacy Nobuyuki Osaki SAN Solutions Lab Hitachi America Ltd Hitachi and Hitachi Data Systems Hitachi Ltd Founded 1910 One of the World s Largest Integrated

More information

Protocols for Secure Cloud Computing

Protocols for Secure Cloud Computing IBM Research Zurich Christian Cachin 28 September 2010 Protocols for Secure Cloud Computing 2009 IBM Corporation Where is my data? 1985 2010 Who runs my computation? 1985 2010 IBM Research - Zurich Overview

More information

CipherShare Features and Benefits

CipherShare Features and Benefits CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application

More information

Enterprise-Wide Storage Security with. Decru DataFort Appliances

Enterprise-Wide Storage Security with. Decru DataFort Appliances Enterprise-Wide Storage Security with Decru DataFort Appliances SECURING NETWORKED STORAGE CONTENTS 1. Executive Summary 2. Trends in Data Security and Privacy 3. Solution Overview: Decru DataFort Storage

More information

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server Inhalte Teil 01 Network Architecture Standards Network Components and Terminology Network Architecture Network Media Access Control Methods

More information

SiRiUS: Securing Remote Untrusted Storage

SiRiUS: Securing Remote Untrusted Storage SiRiUS: Securing Remote Untrusted Storage NDSS 2003 Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, and Dan Boneh Stanford University Introduction Secure network file systems not widespread. Why? 1. Hard

More information

Bloombase StoreSafe Security Best Practice

Bloombase StoreSafe Security Best Practice Bloombase StoreSafe Security Best Practice How to Harden Bloombase StoreSafe and Get the Most from Bloombase Next-Generation Data At-Rest Security B E S T P R A C T I C E Bloombase - Next Generation Data

More information

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Security in Storage and File Systems. Rajeev Thakur Argonne National Laboratory

Security in Storage and File Systems. Rajeev Thakur Argonne National Laboratory Security in Storage and File Systems Rajeev Thakur Argonne National Laboratory Nice Survey Papers Securing Data in Storage: A Review of Current Research Paul Stanton, UIUC http://arxiv.org/ftp/cs/papers/0409/0409034.pdf

More information

Securing Data at Rest ViSolve IT Security Team

Securing Data at Rest ViSolve IT Security Team Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1

More information

SGFS: Secure, Flexible, and Policy-based Global File Sharing

SGFS: Secure, Flexible, and Policy-based Global File Sharing SGFS: Secure, Flexible, and Policy-based Global File Sharing Vishal Kher Eric Seppanen Cory Leach Yongdae Kim {vkher,seppanen,leach,kyd}@cs.umn.edu University of Minnesota Motivation for Network attached

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

Scalable Windows Server File Serving Clusters Using Sanbolic s Melio File System and DFS

Scalable Windows Server File Serving Clusters Using Sanbolic s Melio File System and DFS Scalable Windows Server File Serving Clusters Using Sanbolic s Melio File System and DFS (A step-by-step guide) www.sanbolic.com Software to Simplify and Share SAN Storage Introduction Viewed by many as

More information

Scale and Availability Considerations for Cluster File Systems. David Noy, Symantec Corporation

Scale and Availability Considerations for Cluster File Systems. David Noy, Symantec Corporation Scale and Availability Considerations for Cluster File Systems David Noy, Symantec Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted.

More information

EMC ENCRYPTION AS A SERVICE

EMC ENCRYPTION AS A SERVICE White Paper EMC ENCRYPTION AS A SERVICE With CloudLink SecureVSA Data security for multitenant clouds Transparent to applications Tenant control of encryption keys EMC Solutions Abstract This White Paper

More information

Quantum StorNext. Product Brief: Distributed LAN Client

Quantum StorNext. Product Brief: Distributed LAN Client Quantum StorNext Product Brief: Distributed LAN Client NOTICE This product brief may contain proprietary information protected by copyright. Information in this product brief is subject to change without

More information

Windows Server. Introduction to Windows Server 2008 and Windows Server 2008 R2

Windows Server. Introduction to Windows Server 2008 and Windows Server 2008 R2 Copyright 2006-2013 MilliByte SS Windows Server DƏRS Introduction to Windows Server 2008 and Windows Server 2008 R2 Functionality of Windows Server 2008 Windows Server 2008 Editions 1 Microsoft Hyper-V

More information

WHITE PAPER: customize. Best Practice for NDMP Backup Veritas NetBackup. Paul Cummings. January 2009. Confidence in a connected world.

WHITE PAPER: customize. Best Practice for NDMP Backup Veritas NetBackup. Paul Cummings. January 2009. Confidence in a connected world. WHITE PAPER: customize DATA PROTECTION Confidence in a connected world. Best Practice for NDMP Backup Veritas NetBackup Paul Cummings January 2009 Best Practice for NDMP Backup Veritas NetBackup Contents

More information

NAS or iscsi? White Paper 2007. Selecting a storage system. www.fusionstor.com. Copyright 2007 Fusionstor. No.1

NAS or iscsi? White Paper 2007. Selecting a storage system. www.fusionstor.com. Copyright 2007 Fusionstor. No.1 NAS or iscsi? Selecting a storage system White Paper 2007 Copyright 2007 Fusionstor www.fusionstor.com No.1 2007 Fusionstor Inc.. All rights reserved. Fusionstor is a registered trademark. All brand names

More information

Storage Virtualization

Storage Virtualization Section 2 : Storage Networking Technologies and Virtualization Storage Virtualization Chapter 10 EMC Proven Professional The #1 Certification Program in the information storage and management industry

More information

Scalable Windows Storage Server File Serving Clusters Using Melio File System and DFS

Scalable Windows Storage Server File Serving Clusters Using Melio File System and DFS Scalable Windows Storage Server File Serving Clusters Using Melio File System and DFS Step-by-step Configuration Guide Table of Contents Scalable File Serving Clusters Using Windows Storage Server Using

More information

an introduction to networked storage

an introduction to networked storage an introduction to networked storage How networked storage can simplify your data management The key differences between SAN, DAS, and NAS The business benefits of networked storage Introduction Historical

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

Storage and High Availability with Windows Server 10971B; 4 Days, Instructor-led

Storage and High Availability with Windows Server 10971B; 4 Days, Instructor-led Storage and High Availability with Windows Server 10971B; 4 Days, Instructor-led Course Description Get hands-on instruction and practice provisioning your storage requirements and meeting your high availability

More information

Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 - Security - 1 - OPC UA - Security Security Access control Wide adoption of OPC SCADA & DCS Embedded devices Performance Internet Scalability MES Firewalls ERP Communication between distributed systems OPC

More information

THE CLOUD STORAGE ARGUMENT

THE CLOUD STORAGE ARGUMENT THE CLOUD STORAGE ARGUMENT The argument over the right type of storage for data center applications is an ongoing battle. This argument gets amplified when discussing cloud architectures both private and

More information

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following

More information

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent

More information

FAN An Architecture for Scalable, Service-Oriented Data Management

FAN An Architecture for Scalable, Service-Oriented Data Management FAN An Architecture for Scalable, Service-Oriented Data Management Richard Gillett Acopia Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals

More information

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

iscsi: Accelerating the Transition to Network Storage

iscsi: Accelerating the Transition to Network Storage iscsi: Accelerating the Transition to Network Storage David Dale April 2003 TR-3241 WHITE PAPER Network Appliance technology and expertise solve a wide range of data storage challenges for organizations,

More information

Introduction to the Network Data Management Protocol (NDMP)

Introduction to the Network Data Management Protocol (NDMP) Intelligent Network Computing Introduction to the Network Data Management Protocol (NDMP) The explosion of data generation and storage in recent years has led to the introduction of new technologies for

More information

SMB 3.0 New Opportunities for Windows Environments

SMB 3.0 New Opportunities for Windows Environments SMB 3.0 New Opportunities for Windows PRESENTATION TITLE GOES HERE Environments Webcast Presenters Linda Wu Director of Product Management, Windows File Services NetApp Linda Wu is the Director of Product

More information

Benefits of Networked Storage: iscsi & Fibre Channel SANs. David Dale, NetApp

Benefits of Networked Storage: iscsi & Fibre Channel SANs. David Dale, NetApp Benefits of Networked Storage: iscsi & Fibre Channel SANs David Dale, NetApp SNIA Legal Notice The material contained in this presentation is copyrighted by the SNIA. Member companies and individuals may

More information

Encrypted File Systems. Don Porter CSE 506

Encrypted File Systems. Don Porter CSE 506 Encrypted File Systems Don Porter CSE 506 Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue

More information

Storage Networking Foundations Certification Workshop

Storage Networking Foundations Certification Workshop Storage Networking Foundations Certification Workshop Duration: 2 Days Type: Lecture Course Description / Overview / Expected Outcome A group of students was asked recently to define a "SAN." Some replies

More information

Performance, Reliability, and Operational Issues for High Performance NAS Storage on Cray Platforms. Cray User Group Meeting June 2007

Performance, Reliability, and Operational Issues for High Performance NAS Storage on Cray Platforms. Cray User Group Meeting June 2007 Performance, Reliability, and Operational Issues for High Performance NAS Storage on Cray Platforms Cray User Group Meeting June 2007 Cray s Storage Strategy Background Broad range of HPC requirements

More information

CRUST: Cryptographic Remote Untrusted Storage without Public Keys

CRUST: Cryptographic Remote Untrusted Storage without Public Keys CRUST: Cryptographic Remote Untrusted Storage without Public Keys Erel Geron Avishai Wool July 10, 2007 Abstract This paper presents CRUST, a stackable file system layer designed to provide secure file

More information

10971B: Storage and High Availability with Windows Server

10971B: Storage and High Availability with Windows Server 10971B: Storage and High Availability with Windows Server Course Details Course Code: Duration: Notes: 10971B 4 days This course syllabus should be used to determine whether the course is appropriate for

More information

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature

More information

Secure data storage. André Zúquete Security 1

Secure data storage. André Zúquete Security 1 Secure data storage André Zúquete Security 1 Problems (1/3) ( The classical file system protection is limited Physical protection assumptions Physical confinement of storage devices Logical protection

More information

Hyper-V over SMB: Remote File Storage Support in Windows Server 2012 Hyper-V. Jose Barreto Principal Program Manager Microsoft Corporation

Hyper-V over SMB: Remote File Storage Support in Windows Server 2012 Hyper-V. Jose Barreto Principal Program Manager Microsoft Corporation Hyper-V over SMB: Remote Storage Support in Windows Server 2012 Hyper-V Jose Barreto Principal Program Manager Microsoft Corporation Abstract In this session, we cover the Windows Server 2012 Hyper-V support

More information

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Course 10971:Storage and High Availability with Windows Server

Course 10971:Storage and High Availability with Windows Server Course 10971:Storage and High Availability with Windows Server Type:Course Audience(s):IT Professionals Technology:Windows Server Level:300 This Revision:B Delivery method: Instructor-led (classroom) Length:4

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Accelerating Network Attached Storage with iscsi

Accelerating Network Attached Storage with iscsi ESG Lab Review EMC MPFSi: Accelerating Network Attached Storage with iscsi A Product Review by ESG Lab May 2006 Authors: Tony Asaro Brian Garrett Copyright 2006, Enterprise Strategy Group, Inc. All Rights

More information

Storage and High Availability with Windows Server

Storage and High Availability with Windows Server CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Course 10971 Storage and High Availability with Windows Server Length: 5 Days Audience: IT Professionals

More information

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons

More information

Server and Storage Consolidation with iscsi Arrays. David Dale, NetApp

Server and Storage Consolidation with iscsi Arrays. David Dale, NetApp Server and Consolidation with iscsi Arrays David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this

More information

Storage and High Availability with Windows Server

Storage and High Availability with Windows Server Course 10971A: Storage and High Availability with Windows Server Course Details Course Outline Module 1: Disks and Volumes with Windows Server This module introduces you to different storage technologies.

More information

Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive

Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive Using XenData Software and a Spectra Logic Archive With the Video Edition of XenData Archive Series software on a Windows server and a Spectra Logic T-Series digital archive, broadcast organizations have

More information

WHITE PAPER www.tresorit.com

WHITE PAPER www.tresorit.com WHITE PAPER tresor [tʀeˈzoːɐ ] noun (German) 1. lockable, armoured cabinet THE CLOUD IS UNTRUSTED The cloud has huge potential when it comes to storing, sharing and exchanging files, but the security provided

More information

NAS or iscsi? White Paper 2006. Selecting a storage system. Copyright 2006 Open-E www.open-e.com

NAS or iscsi? White Paper 2006. Selecting a storage system. Copyright 2006 Open-E www.open-e.com NAS or iscsi? Selecting a storage system White Paper 2006 Copyright 2006 Open-E www.open-e.com 2006 Open-E GmbH. All rights reserved. Open-E is a registered trademark. All brand names and products are

More information

Training Name Installing and Configuring Windows Server 2012

Training Name Installing and Configuring Windows Server 2012 Training Name Installing and Configuring Windows Server 2012 Exam Code 70 410 At Course Completion After completing this course, students will be able to: Install and configure Windows Server 2012. Describe

More information

How To Set Up Egnyte For Netapp Sync For Netapp

How To Set Up Egnyte For Netapp Sync For Netapp Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...

More information

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Topics Single Sign-on Kerberos v5 integration Active Directory security Delegation of authentication

More information

How To Back Up A Computer To A Backup On A Hard Drive On A Microsoft Macbook (Or Ipad) With A Backup From A Flash Drive To A Flash Memory (Or A Flash) On A Flash (Or Macbook) On

How To Back Up A Computer To A Backup On A Hard Drive On A Microsoft Macbook (Or Ipad) With A Backup From A Flash Drive To A Flash Memory (Or A Flash) On A Flash (Or Macbook) On Solutions with Open-E Data Storage Software (DSS V6) Software Version: DSS ver. 6.00 up40 Presentation updated: September 2010 Different s opportunities using Open-E DSS The storage market is still growing

More information

EMC BACKUP MEETS BIG DATA

EMC BACKUP MEETS BIG DATA EMC BACKUP MEETS BIG DATA Strategies To Protect Greenplum, Isilon And Teradata Systems 1 Agenda Big Data: Overview, Backup and Recovery EMC Big Data Backup Strategy EMC Backup and Recovery Solutions for

More information

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything BlueArc unified network storage systems 7th TF-Storage Meeting Scale Bigger, Store Smarter, Accelerate Everything BlueArc s Heritage Private Company, founded in 1998 Headquarters in San Jose, CA Highest

More information

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP

More information

NET ACCESS VOICE PRIVATE CLOUD

NET ACCESS VOICE PRIVATE CLOUD Page 0 2015 SOLUTION BRIEF NET ACCESS VOICE PRIVATE CLOUD A Cloud and Connectivity Solution for Hosted Voice Applications NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of

More information

Xangati Storage Solution Brief. Optimizing Virtual Infrastructure Storage Systems with Xangati

Xangati Storage Solution Brief. Optimizing Virtual Infrastructure Storage Systems with Xangati Optimizing Virtual Infrastructure Storage Systems with Xangati Virtualized infrastructures are comprised of servers, switches, storage systems and client devices. Of the four, storage systems are the most

More information

Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците

Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Why SAN? Business demands have created the following challenges for storage solutions: Highly available and easily

More information

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud 1 Contents The Obligation to Protect Patient Data in the Cloud................................................... Complying with the HIPAA

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

Introduction to Highly Available NFS Server on scale out storage systems based on GlusterFS

Introduction to Highly Available NFS Server on scale out storage systems based on GlusterFS Introduction to Highly Available NFS Server on scale out storage systems based on GlusterFS Soumya Koduri Red Hat Meghana Madhusudhan Red Hat AGENDA What is GlusterFS? Integration with NFS Ganesha Clustered

More information

ABC of Storage Security. M. Granata NetApp System Engineer

ABC of Storage Security. M. Granata NetApp System Engineer ABC of Storage Security M. Granata NetApp System Engineer Encryption Challenges Meet Regulatory Requirements No Performance Impact Ease of Installation Government and industry regulations mandate protection

More information

ABCs of Data Encryption for Storage. Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems

ABCs of Data Encryption for Storage. Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems ABCs of Data Encryption for Storage Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member

More information

How To Design A Data Center

How To Design A Data Center Data Center Design & Virtualization Md. Jahangir Hossain Open Communication Limited jahangir@open.com.bd Objectives Data Center Architecture Data Center Standard Data Center Design Model Application Design

More information

Plutus Security Paper - A Brief Overview

Plutus Security Paper - A Brief Overview USENIX Association Proceedings of FAST 03: 2nd USENIX Conference on File and Storage Technologies San Francisco, CA, USA March 31 April 2, 2003 2003 by The USENIX Association All Rights Reserved For more

More information

Egnyte Local Cloud Architecture. White Paper

Egnyte Local Cloud Architecture. White Paper w w w. e g n y t e. c o m Egnyte Local Cloud Architecture White Paper Revised June 21, 2012 Table of Contents Egnyte Local Cloud Introduction page 2 Scalable Solutions Personal Local Cloud page 3 Office

More information

Vormetric Encryption Architecture Overview

Vormetric Encryption Architecture Overview Vormetric Encryption Architecture Overview Protecting Enterprise Data at Rest with Encryption, Access Controls and Auditing Vormetric, Inc. 2545 N. 1st Street, San Jose, CA 95131 United States: 888.267.3732

More information

Distributed File System Choices: Red Hat Storage, GFS2 & pnfs

Distributed File System Choices: Red Hat Storage, GFS2 & pnfs Distributed File System Choices: Red Hat Storage, GFS2 & pnfs Ric Wheeler Architect & Senior Manager, Red Hat June 27, 2012 Overview Distributed file system basics Red Hat distributed file systems Performance

More information

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012 Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret

More information

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods

More information

Overview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation

Overview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation Overview of I/O Performance and RAID in an RDBMS Environment By: Edward Whalen Performance Tuning Corporation Abstract This paper covers the fundamentals of I/O topics and an overview of RAID levels commonly

More information

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Citrix MetaFrame XP Security Standards and Deployment Scenarios Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document

More information

Network File System (NFS)

Network File System (NFS) Network File System (NFS) Brad Karp UCL Computer Science CS GZ03 / M030 10 th October 2011 NFS Is Relevant Original paper from 1985 Very successful, still widely used today Early result; much subsequent

More information