Authenticated Key Exchange Protocols for Parallel Network File Systems

被引:2
|
作者
Lim, Hoon Wei [1 ]
Yang, Guomin [2 ]
机构
[1] Natl Univ Singapore, Sch Comp, Singapore 117548, Singapore
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
Parallel sessions; authenticated key exchange; network file systems; forward secrecy; key escrow;
D O I
10.1109/TPDS.2015.2388447
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the problem of key establishment for secure many-to-many communications. The problem is inspired by the proliferation of large-scale distributed file systems supporting parallel access to multiple storage devices. Our work focuses on the current Internet standard for such file systems, i. e., parallel Network File System (pNFS), which makes use of Kerberos to establish parallel session keys between clients and storage devices. Our review of the existing Kerberos-based protocol shows that it has a number of limitations: (i) a metadata server facilitating key exchange between the clients and the storage devices has heavy workload that restricts the scalability of the protocol; (ii) the protocol does not provide forward secrecy; (iii) the metadata server generates itself all the session keys that are used between the clients and storage devices, and this inherently leads to key escrow. In this paper, we propose a variety of authenticated key exchange protocols that are designed to address the above issues. We show that our protocols are capable of reducing up to approximately 54 percent of the workload of the metadata server and concurrently supporting forward secrecy and escrow-freeness. All this requires only a small fraction of increased computation overhead at the client.
引用
收藏
页码:92 / 105
页数:14
相关论文
共 50 条
  • [1] IMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL FOR PARALLEL NETWORK FILE SYSTEMS IN CLOUD
    Chandravathi, C.
    Somasundaram, K.
    Kandasamy, Ramesh
    Velmurugan, J.
    IIOAB JOURNAL, 2016, 7 (09) : 430 - 436
  • [2] Password authenticated key exchange protocols among diverse network domains
    Yeh, HT
    Sun, HM
    COMPUTERS & ELECTRICAL ENGINEERING, 2005, 31 (03) : 175 - 189
  • [3] Modelling Time for Authenticated Key Exchange Protocols
    Schwenk, Joerg
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 277 - 294
  • [4] Scalable Protocols for Authenticated Group Key Exchange
    Jonathan Katz
    Moti Yung
    Journal of Cryptology, 2007, 20 : 85 - 113
  • [5] Scalable protocols for authenticated group key exchange
    Katz, Jonathan
    Yung, Moti
    JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 85 - 113
  • [6] Scalable protocols for authenticated group key exchange
    Katz, J
    Yung, M
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 110 - 125
  • [7] Analysis of Two Authenticated Key Exchange Protocols
    Cheng, Qingfeng
    Hang, Guangguo
    Ma, Chuangui
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 398 - +
  • [8] Certificateless and Identity based Authenticated Key Exchange Protocols
    Badrinarayanan, Saikrishna
    Rangan, C. Pandu
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 255 - 277
  • [9] Authenticated Key Exchange Protocols Based on Factoring Assumption
    Huang, Hai
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 21 - 37
  • [10] Elliptic curve based password authenticated key exchange protocols
    Boyd, C
    Montague, P
    Nguyen, K
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 487 - 501