Security in Storage Networks A Current Perspective



Similar documents
Strong Security for Distributed File Systems

Secure File System. Jim Hughes, Storage Technology Corporation. Chris Feist, Steve Hawkinson, Jeff Perrault, Matthew O Keefe, University of Minnesota

Plutus: scalable secure file sharing on untrusted storage

Secure Backup and Recovery Whitepaper. Securing Data in Backup and Disaster Recovery Sites with Decru DataFort Appliances

Network Attached Storage. Jinfeng Yang Oct/19/2015

FileCloud Security FAQ

DAS to SAN Migration Using a Storage Concentrator

UNDERSTANDING DATA DEDUPLICATION. Thomas Rivera SEPATON

Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center

UNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard

UNDERSTANDING DATA DEDUPLICATION. Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s.

Data Storage at IBT. Topics. Storage, Concepts and Guidelines

Protocols for Secure Cloud Computing

CipherShare Features and Benefits

Enterprise-Wide Storage Security with. Decru DataFort Appliances

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

SiRiUS: Securing Remote Untrusted Storage

Bloombase StoreSafe Security Best Practice

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

MySQL Security: Best Practices

Securing Data at Rest ViSolve IT Security Team

SGFS: Secure, Flexible, and Policy-based Global File Sharing

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Scalable Windows Server File Serving Clusters Using Sanbolic s Melio File System and DFS

Scale and Availability Considerations for Cluster File Systems. David Noy, Symantec Corporation

EMC ENCRYPTION AS A SERVICE

Quantum StorNext. Product Brief: Distributed LAN Client

Windows Server. Introduction to Windows Server 2008 and Windows Server 2008 R2

WHITE PAPER: customize. Best Practice for NDMP Backup Veritas NetBackup. Paul Cummings. January Confidence in a connected world.

NAS or iscsi? White Paper Selecting a storage system. Copyright 2007 Fusionstor. No.1

Storage Virtualization

Scalable Windows Storage Server File Serving Clusters Using Melio File System and DFS

an introduction to networked storage

Security Policy Revision Date: 23 April 2009

Storage and High Availability with Windows Server 10971B; 4 Days, Instructor-led

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

FAN An Architecture for Scalable, Service-Oriented Data Management

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features

Overview. SSL Cryptography Overview CHAPTER 1

iscsi: Accelerating the Transition to Network Storage

Introduction to the Network Data Management Protocol (NDMP)

SMB 3.0 New Opportunities for Windows Environments

Encrypted File Systems. Don Porter CSE 506

Storage Networking Foundations Certification Workshop

Performance, Reliability, and Operational Issues for High Performance NAS Storage on Cray Platforms. Cray User Group Meeting June 2007

10971B: Storage and High Availability with Windows Server

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

Hyper-V over SMB: Remote File Storage Support in Windows Server 2012 Hyper-V. Jose Barreto Principal Program Manager Microsoft Corporation

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Course 10971:Storage and High Availability with Windows Server

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Storage and High Availability with Windows Server

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Server and Storage Consolidation with iscsi Arrays. David Dale, NetApp

Storage and High Availability with Windows Server

Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive

WHITE PAPER

Training Name Installing and Configuring Windows Server 2012

How To Set Up Egnyte For Netapp Sync For Netapp

How To Back Up A Computer To A Backup On A Hard Drive On A Microsoft Macbook (Or Ipad) With A Backup From A Flash Drive To A Flash Memory (Or A Flash) On A Flash (Or Macbook) On

EMC BACKUP MEETS BIG DATA

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

NET ACCESS VOICE PRIVATE CLOUD

Xangati Storage Solution Brief. Optimizing Virtual Infrastructure Storage Systems with Xangati

Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците

CRYPTOGRAPHY IN NETWORK SECURITY

Introduction to Highly Available NFS Server on scale out storage systems based on GlusterFS

ABC of Storage Security. M. Granata NetApp System Engineer

How To Design A Data Center

Egnyte Local Cloud Architecture. White Paper

Vormetric Encryption Architecture Overview

Distributed File System Choices: Red Hat Storage, GFS2 & pnfs

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Overview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Network File System (NFS)

Transcription:

Security in Storage Networks A Current Perspective Christian Cachin <cca@zurich.ibm.com> ZISC Colloquium www.zurich.ibm.com

Overview Networked storage systems NAS, SAN, OBS Design options for security data in flight & data at rest SAN filesystems Cryptographic SAN filesystem Summary 2 ZISC Colloquium 2004 IBM Corporation

Traditional Storage Systems app fs inode blk hba Direct-attached Storage 3 ZISC Colloquium 2004 IBM Corporation

Networked Storage Systems: NAS, OBS, SAN app app app fs fs fs fs inode inode inode inode NFS, CIFS (TCP/IP) blk hba OBS Protocol blk hba blk blk hba FC, iscsi NAS (Network-attached Storage) Object Storage (OBS, proposed to SNIA ) SAN (Storage-area Network) 4 ZISC Colloquium 2004 IBM Corporation

Network-based Storage Devices File server - read & write data in file - create & destroy file - directory operations - file/dir-based access control - space allocation - backup ops Object storage dev. - read & write bytes in object - create & destroy object -- - object-level access control - space allocation - backup ops Block device - read & write blocks -- -- - device-level access control -- -- 5 ZISC Colloquium 2004 IBM Corporation

Security in Networked Storage Systems Existing technology offers little protection Server room only Trusted storage providers, works, and clients Coarse-grained access control Security is needed Storage as a commodity Networked storage to desktop (iscsi) Threats - physical access to disks - access to work - authorized machines - unauthorized machines 6 ZISC Colloquium 2004 IBM Corporation

Security Toolbox Goals Confidentiality (no unauthorized access) Integrity (no unauthorized modification) Availability Mechanisms Encryption Confidentiality based on shared key k E k E k Message-authentication code (MAC) Integrity based on shared key k M k M k Hashing and digital signatures Integrity, w.r.t. reference value v H v Access control Confidentiality, integrity, availability Any mechanism on any layer, and in combination with others. 7 ZISC Colloquium 2004 IBM Corporation

Two Options for a Security Design 1) Protect the work - data in flight app... fs/obj/blk fs/obj/blk... hba 8 ZISC Colloquium 2004 IBM Corporation

Two Options for a Security Design 1) Protect the work - data in flight app... fs/obj/blk fs/obj/blk 2) Protect the data path - data at rest... hba 9 ZISC Colloquium 2004 IBM Corporation

Protecting Data in Flight Security in work/transport layer IPSEC, secure RPC... app... Access control on corresponding storage layer fs/obj/blk fs/obj/blk NAS at filesystem layer M E E M... AFS, NFSv4 hba ObjectStore at object layer NASD [Gibson et al./cmu], ObjectStore [Azagury et al./ibm] SAN at block layer Snapdragon [Aguilera et al./hp SRC] 10 ZISC Colloquium 2004 IBM Corporation

Protecting Data in Flight: Object Storage Link security on SAN - secure channel established by admin Protects data in flight Decrypts data on storage side admin Protection of object access at storage device client M E E M - access control through credentials - (cryptographic) capabilities by admin No unauthorized actions on data Requires new storage interface 11 ZISC Colloquium 2004 IBM Corporation

Protecting Data at Rest Encryption Integrity verification Access control Depending on storage layer: Cryptographic filesystems app fs/obj/blk cfs [Blaze], cepheus [Fu/MIT], SFS [Mazières et al./ MIT&NYU], EFS [W2k] & rest of the talk!... M E fs/obj/blk... hba Cryptographic Object Storage SAN encryption Security applicances [Decru, NeoScale, KastenChase] 12 ZISC Colloquium 2004 IBM Corporation

Protecting Data at Rest Encryption: keys? separate security admin server encrypted with user/group public key held by hardware module Integrity verification: reference values? integrated in directory inode tree is hash tree app... M E fs/obj/blk digital signatures under user/group public-key Access control: credentials? separate security admin server (Kerberos, ObjStore admin) fs/obj/blk... hba 13 ZISC Colloquium 2004 IBM Corporation

Protecting Data at Rest: A Cryptographic SAN Filesystem 14 ZISC Colloquium 2004 IBM Corporation

Protecting Data at Rest: A Cryptographic SAN Filesystem SAN today: Clients access block storage devices directly Fibre Channel (SCSI) Static configuration OS sees a local block storage device Static access control zoning & fencing in FC switch Inside server room only client client SAN 15 ZISC Colloquium 2004 IBM Corporation

SAN Filesystems (e.g. IBM's StorageTank) Virtualized block storage space Block access managed by metadata server (MDS) Single filesystem name space Heterogeneous clients Un*x client app vfs W2k client app vfs metadata blk blk LAN MDS (clustered) SAN 16 ZISC Colloquium 2004 IBM Corporation

Design of a Cryptographic SAN Filesystem Integrity verification & encryption in client Scalable End-to-end security MDS is trusted, provides encryption keys & reference data Integrate key management with metadata No modification of storage interface Needs secure LAN connection MDS LAN client H E client H E SAN 17 ZISC Colloquium 2004 IBM Corporation

Confidentiality Protection Data is encrypted on client Data encrypted in flight and at rest Metadata server holds keys, one key per file/object Selective, fine-grained activation Storage interface unmodified Impossible to prevent overwrites AES (e.g.) MDS client E k client E k SAN NIST standard (2001), fast & secure ~ 80MByte/s in software (Xeon 3GHz) Key evolution Fresh key on data rewrite 18 ZISC Colloquium 2004 IBM Corporation

Key Evolution in Cryptographic Filesystems Knowledge of Key = Access to data Key revocation & key evolution Grant access Hand out key Revoke access Change key... expensive! Re-encrypt complete file with fresh key Do nothing as long as no data is written Fresh key for freshly written data 19 ZISC Colloquium 2004 IBM Corporation

Integrity Protection Data is hashed on client to digest values Digest values stored at MDS Secure transfer of digests Integrity protected in flight and at rest, modifications are detected Storage interface unmodified Impossible to prevent overwrites, but violations are detected SHA-1, SHA-256 or others MDS v H v H SAN NIST standards, fast & secure ~ 260 MByte/s in software (Xeon 3GHz) Granularity? Incremental updates? Design alternatives 20 ZISC Colloquium 2004 IBM Corporation

Integrity Protection: Design Alternatives Assumption: MDS trusted Design 1: Digests of all files stored by MDS + Simple + Little storage overhead at MDS (SHA-256: 32 bytes per file) Updates require recalculation of digest, work proportional to file length Integrity can only be verified after entire file has been processed; partial reads inefficient Design 2: Digests stored by MDS, using incremental hashing + Almost as simple as Design 1 + Incremental updates, work independent of file length + Little storage overhead at MDS (SHA-256: 32 bytes per file) Integrity can only be verified after entire file has been processed; partial reads inefficient Somewhat slower than Design 1 21 ZISC Colloquium 2004 IBM Corporation

Integrity Protection: Design Alternatives (2) root Design 3: Hash tree [Merkle], stored by MDS + Incremental updates with logarithmic work + Verification of partial reads Storage and data transfer overhead at MDS (linear in file size / degree of tree) H H H H H H H H H H H H H H H H H H H Design 4 (choice): Hash tree, tree stored on SAN, root by MDS + All advantages of above + Almost no overhead at MDS + Extensible to NFSv4 named attributes or NTFS streams 22 ZISC Colloquium 2004 IBM Corporation

Integrity Protection with Author Attestation User signs file data Implementation on top of hash tree by signing root Provides partial audit trail (last writer) Reference storage Data retention allows full audit trail Key management requires a public-key infrastructure Associate keys with file system users Use existing PKI (PGP, X.509) Keys and certificates managed by clients MDS only storages keys, needs not be trusted 23 ZISC Colloquium 2004 IBM Corporation

Comparing the Two Options Protecting data in flight + well-established work security tools + access control at storage device stored data is not encrypted / verified needs new storage device interfaces Protecting data at rest new mechanisms no prevention of overwrites + end-to-end security for stored data (data in flight & at rest) + scalable, data is encrypted / verified only once + transparent to storage device Combination is possible in particular when implemented at different layers 24 ZISC Colloquium 2004 IBM Corporation

Summary Networked storage systems NAS, ObjectStore, SAN Design options for security Protecting data in flight Protecting data at rest Recent trends ObjectStore Cryptographic SAN Filesystems 25 ZISC Colloquium 2004 IBM Corporation

Thank you! More information? http://www.zurich.ibm.com/~cca <cca@zurich.ibm.com> 26 ZISC Colloquium 2004 IBM Corporation