5 research outputs found

    A CORRECT PROTOCOLS REPLACE FOR MATCHING NETWORK FILE SYSTEMS

    Get PDF
    While using the growing use of very network-attached storage systems, several works has focussed on scalable security. Our purpose should be to design ingenious in addition to secure techniques of authenticated key exchange which will get together particular requirements of parallel Network File System.  Our work concentrates on present Internet standards particularly parallel Network File System using Kerberos to start parallel session keys among clients and storage products. We create a study of impracticality of key establishment for efficient many-to-many communications. The suggested techniques can decrease workload of metadata server by way of about 50 % when compared with provide Kerberos-based protocol, whereas achieving needed security characteristics in addition to keeping computational overhead at clients and storage products at practically low-level

    Advances the Forward Security in Parallel Network File System using An Efficient and Reliable Key Exchange Protocols

    Get PDF
    In parallel file system we can disperse data over numerous nodes to permit simultaneous access by various errands of a parallel application. By play out the numerous errands in a parallel system is commonly to reduce execution and solid access to substantial data sets. In this work, we research the issue of secure many to numerous correspondences in substantial scale network file systems that bolster parallel access to different storage devices. That is, we consider a correspondence model where there are countless getting to various remote and conveyed storage devices in parallel. Especially, we concentrate on the most proficient method to trade key materials and set up parallel secure sessions between the clients and the storage devices in the parallel Network File System the present Internet standard in a productive and versatile way. In this paper we are proposed convention for performing key trade and furthermore build up parallel secure session amongst clients and storage devices. In this paper we are likewise proposed another idea for encryption and decoding of put away data. By actualizing this procedure we are utilizing mixture encryption and decoding calculation. By actualizing those ideas we can enhance execution of network and furthermore give greater security of put away data in the put away devices

    Extended pointers for memory protection in single address space systems

    Get PDF
    With reference to a single address space paradigm of memory addressing, we identify a set of mechanisms aimed at preserving the integrity of the virtual space of a given process from erroneous or fraudulent access attempts originated from other processes. These mechanisms guarantee a level of protection that is, in many respects, superior to that of a traditional multiple address space environment. We introduce extended pointers as a generalization of the concept of a memory address, which includes a password and an access authorization. A universally known, parametric one-way function is used to assign passwords. A specialized address translation circuitry supports memory reference and protection at the hardware level. A small set of protection primitives forms the process interface of the protection system. An indication of the flexibility of the proposed protection paradigm is given by applying extended pointers to the solution of a variety of protection problems

    Memory protection in embedded systems

    Get PDF
    With reference to an embedded system featuring no support for memory management, we present a model of a protection system based on passwords. At the hardware level, our model takes advantage of a memory protection unit (MPU) interposed between the processor and the complex of the main memory and the input-output devices. The MPU supports both concepts of a protection context and a protection domain. A protection context is a set of access rights for the memory pages; a protection domain is a set of one or more protection contexts. Passwords are associated with protection domains. A process that holds a given password can take advantage of this password to activate the corresponding domain. A small set of protection primitives makes it possible to modify the composition of the domains in a strictly controlled fashion. The proposed protection model is evaluated from a number of important viewpoints, which include password distribution, review and revocation, the memory requirements for storage of the information concerning protection, and the time necessary for password validation

    Protected pointers to specify access privileges in distributed systems

    Get PDF
    With reference to a distributed environment consisting of nodes connected in an arbitrary network topology, we propose the organization of a protection system in which a set of subjects, e.g. processes, generates access attempts to memory segments. One or more primary passwords are associated with each node. An access to a given segment can be accomplished successfully only if the subject attempting the access holds an access privilege, certified by possession of a valid protected pointer (p-pointer) referencing that segment. Each p-pointer includes a local password; the p-pointer is valid if the local password descends from a primary password by application of a universally known, parametric one-way generation function. A set of protection primitives makes it possible to manage the primary passwords, to reduce p-pointers to include less access rights, to allocate new segments, to delete existing segments, to read the segment contents and to overwrite these contents. The resulting protection environment is evaluated from a number of viewpoints, which include p-pointer forging and revocation, the network traffic generated by the execution of the protection primitives, the memory requirements for p-pointer storage, security, and the relation of our work to previous work. An indication of the flexibility of the p-pointer concept is given by applying p-pointers to the solution of a variety of protection problems
    corecore