DOI QR코드

DOI QR Code

A Secure Ubiquitous Storage System for Mobile Devices

모바일 기기를 위한 안전한 유비쿼터스 스토리지 시스템

  • 태유슈 (동서대학교 디자인&IT 전문대학원) ;
  • 이은유 (동서대학교 디자인&IT 전문대학원) ;
  • 이훈재 (동서대학교 컴퓨터공학과) ;
  • 임효택 (동서대학교 컴퓨터공학과)
  • Published : 2008.02.29

Abstract

The rapid growth of ubiquitous technology has increased the demand of storage capacity in mobile computing. iSCSI(Internet Small Computer Interface), a virtual storage protocol would be one of the possible solutions to resolve this problem. However, the insecure nature of this protocol makes it vulnerable to malicious attacks. In this paper, we aims to design and propose a new secure lightweight iSCSI-based virtual storage scheme for mobile devices. Suitable security mechanisms are considered in the design of our proposed solution in order to overcome existing security problems in iSCSI. Relevant experiments are tarried out and the results revealed that the efficiency of proposed algorithm in which it introduces over 100% Read/Write performance improvement compared with the IPsec approach.

최근 유비쿼터스 기술의 급속한 성장으로 모바일 컴퓨팅 분야에서의 스토리지 용량에 대한 요구가 증가하였다. 가상 스토리지 프로토콜인 iSCSI(Internet Small Computer Interface)는 이러한 문제를 효율적으로 해결하기 위한 방안이 될 수 있다. 그러나, 이 프로토콜의 불안전한 특성은 스토리지 시스템을 불안하고 외부에 노출되게 할 우려가 있다. 따라서, 본 논문에서는 모바일 기기를 위한 안전하고도 가벼운 iSCSI 기반의 가상 스토리지 스킴을 설계하고 제안하고자 한다. 성능평가를 통해 제안된 알고리즘은 기존의 IPsec보다 100% 읽기/쓰기 성능개선을 보여주고 있다.

Keywords

References

  1. Hyotaek Lim, Saebom Choi.: Design and Implementation of iSCSI-based Virtual Storage System for Mobile Health Care, HEALTHCOM 2005, Jun. 2005, PP 37-42
  2. J. Satran, K. Meth, C. Sapuntzakis, M. Chadalapaka, E. Zeidner.: Internet Small Computer Systems Interface (iSCSI), Request For Comments 3720, April 2004
  3. T. Wu: The Secure Remote Password Protocol, Proceedings of the Internet Society Symposium on Network and Distributed System Security, NDSS 98, San Diego, California. March 1998, PP. 97-111
  4. M. Bellare and C. Namprempre.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, Lecture Notes In Computer Science, Vol. 1976, pp. 531- 545
  5. B. Aboba, J. Tseng, J. Walker, V. Rangan, and F. Travostino.: Securing Block Storage Protocols over IP, Request For Comments 3723, April 2004
  6. S. Kent and R. Atkinson.: Security Architecture for the Internet Protocol, Request For Comments 2401, November 1998
  7. Shuang-Yi Tang, Ying-Ping Lu, David H.C Du.: Performance Study of Software-Based iSCSI Security, Proceedings of the First InternationalIEEE Security in Storage Workshop, December 11, 2002
  8. S. Kent and R. Atkinson: IP Authentication Header, Request For Comments 2402, November 1998
  9. S. Kent and R. Atkinson and.: IP Encapsulating Security Payload (ESP), Request For Comments 2406, November 1998
  10. D. Harkins and D. Carrel.: The Internet Key Exchange (IKE), Request For Comments 2409, November 1998
  11. Jail Arkko and Pekka Nikander.: Limitations of IPsec Policy Mechanisms, In Security Protocols, Eleventh International Workshop, Cambridge, UK, April 2003
  12. IEEE Standard 1363.2 Study Group. Password-Based Public-Key Cryptography, http://grouper.ieee.org/groups/ 1363/passwdPK
  13. K. Lauter, "The advantages of Elliptic Curve Cryptography For Wireless Security", IEEE Wireless Communications, vol. 11, no. 1, Feb 2004, PP. 62-67
  14. K. Chen, M. Henricksen, W. Millan, J. Fuller, L. Simpson, E. Dawson, H. Lee, and S. Moon.: Dragon: A fast word based stream cipher, ECRYPT Stream Cipher Project Report 2005/2006
  15. H. Krawczyk, M. Bellare and R. Canetti.: HMAC: Keyed-Hashing for Message Authentication, Internet Engineering Task Force, Request For Comments 2104, 1997
  16. National Institute of Standards and Technology, FIPS-180-2: Secure Hash Standard (SHS), August 2002
  17. UNH-iSCSI project, http://unh-iscsi.sourceforge.net/
  18. Threaded I/O Tester, http://sourceforge.net/projects/ tiobench/