Authenticated Key Exchange Protocols for Parallel Network File Systems

被引:2
|
作者
Lim, Hoon Wei [1 ]
Yang, Guomin [2 ]
机构
[1] Natl Univ Singapore, Sch Comp, Singapore 117548, Singapore
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
Parallel sessions; authenticated key exchange; network file systems; forward secrecy; key escrow;
D O I
10.1109/TPDS.2015.2388447
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the problem of key establishment for secure many-to-many communications. The problem is inspired by the proliferation of large-scale distributed file systems supporting parallel access to multiple storage devices. Our work focuses on the current Internet standard for such file systems, i. e., parallel Network File System (pNFS), which makes use of Kerberos to establish parallel session keys between clients and storage devices. Our review of the existing Kerberos-based protocol shows that it has a number of limitations: (i) a metadata server facilitating key exchange between the clients and the storage devices has heavy workload that restricts the scalability of the protocol; (ii) the protocol does not provide forward secrecy; (iii) the metadata server generates itself all the session keys that are used between the clients and storage devices, and this inherently leads to key escrow. In this paper, we propose a variety of authenticated key exchange protocols that are designed to address the above issues. We show that our protocols are capable of reducing up to approximately 54 percent of the workload of the metadata server and concurrently supporting forward secrecy and escrow-freeness. All this requires only a small fraction of increased computation overhead at the client.
引用
收藏
页码:92 / 105
页数:14
相关论文
共 50 条
  • [11] Cryptanalysis of two password-authenticated key exchange protocols
    Wan, ZG
    Wang, SH
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 164 - 175
  • [12] Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model
    Lee, Jooyoung
    Park, Je Hong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 129 - 138
  • [13] Authenticated Key Exchange Protocols Based on Provable Secure Attribute
    Xia, Hui
    Liu, Jie
    FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 1421 - 1425
  • [14] Authenticated key exchange protocols resistant to password guessing attacks
    Kwon, T
    Song, J
    IEE PROCEEDINGS-COMMUNICATIONS, 1998, 145 (05): : 304 - 308
  • [15] IDMS quantum password-authenticated key exchange protocols
    Zhang, Lu
    Sun, Yan
    Xu, Yingfei
    Zhu, Hongfeng
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 25 (3-4)
  • [16] Password Authenticated Key Exchange and Protected Password Change Protocols
    Chang, Ting-Yi
    Hwang, Min-Shiang
    Yang, Chou-Chen
    SYMMETRY-BASEL, 2017, 9 (08):
  • [17] RPL Authenticated Mode Evaluation: Authenticated Key Exchange and Network Behavioral
    Ordu, Arif Burak
    Bayar, Mehmet
    Ors, Berna
    2022 THIRTEENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2022, : 167 - 173
  • [18] Cryptanalysis of two password authenticated key exchange protocols based on RSA
    Cao, Tianjie
    Lim, Dongdai
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (08) : 623 - 625
  • [19] Modular Design of Role-Symmetric Authenticated Key Exchange Protocols
    Xiao, Yuting
    Zhang, Rui
    Ma, Hui
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT IV, 2021, 13093 : 742 - 772
  • [20] Efficient authenticated key exchange protocols for wireless body area networks
    Liu, Jingwei
    Li, Qian
    Yan, Rui
    Sun, Rong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2015,