Authenticated Key Exchange Protocols for Parallel Network File Systems

被引:2
|
作者
Lim, Hoon Wei [1 ]
Yang, Guomin [2 ]
机构
[1] Natl Univ Singapore, Sch Comp, Singapore 117548, Singapore
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
Parallel sessions; authenticated key exchange; network file systems; forward secrecy; key escrow;
D O I
10.1109/TPDS.2015.2388447
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the problem of key establishment for secure many-to-many communications. The problem is inspired by the proliferation of large-scale distributed file systems supporting parallel access to multiple storage devices. Our work focuses on the current Internet standard for such file systems, i. e., parallel Network File System (pNFS), which makes use of Kerberos to establish parallel session keys between clients and storage devices. Our review of the existing Kerberos-based protocol shows that it has a number of limitations: (i) a metadata server facilitating key exchange between the clients and the storage devices has heavy workload that restricts the scalability of the protocol; (ii) the protocol does not provide forward secrecy; (iii) the metadata server generates itself all the session keys that are used between the clients and storage devices, and this inherently leads to key escrow. In this paper, we propose a variety of authenticated key exchange protocols that are designed to address the above issues. We show that our protocols are capable of reducing up to approximately 54 percent of the workload of the metadata server and concurrently supporting forward secrecy and escrow-freeness. All this requires only a small fraction of increased computation overhead at the client.
引用
收藏
页码:92 / 105
页数:14
相关论文
共 50 条
  • [31] Provably secure authenticated key exchange protocols for low power computing clients
    Wen, HA
    Lin, CL
    Hwang, T
    COMPUTERS & SECURITY, 2006, 25 (02) : 106 - 113
  • [32] Provable secure attribute based authenticated key exchange protocols in the standard model
    Wei, Jiang-Hong
    Liu, Wen-Fen
    Hu, Xue-Xian
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (10): : 2397 - 2408
  • [33] DAKEs: Decentralized Authenticated Key Exchange Protocols via Blockchain for Smart City
    Wu, Qiong
    Luo, Yi
    Zhao, Ying
    Qian, Bin
    Guo, Bin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [34] One-round protocols for two-party authenticated key exchange
    Jeong, IR
    Katz, J
    Lee, DH
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 220 - 232
  • [35] A PARALLEL PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOL FOR WIRELESS ENVIRONMENTS
    Lo, Jung-Wen
    Lin, Shu-Chen
    Hwang, Min-Shiang
    INFORMATION TECHNOLOGY AND CONTROL, 2010, 39 (02): : 146 - 151
  • [36] Authenticated key agreement protocols for dew-assisted IoT systems
    An Braeken
    The Journal of Supercomputing, 2022, 78 : 12093 - 12113
  • [37] Authenticated key agreement protocols for dew-assisted IoT systems
    Braeken, An
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (10): : 12093 - 12113
  • [38] ASICS: authenticated key exchange security incorporating certification systems
    Colin Boyd
    Cas Cremers
    Michèle Feltz
    Kenneth G. Paterson
    Bertram Poettering
    Douglas Stebila
    International Journal of Information Security, 2017, 16 : 151 - 171
  • [39] ASICS: authenticated key exchange security incorporating certification systems
    Boyd, Colin
    Cremers, Cas
    Feltz, Michele
    Paterson, Kenneth G.
    Poettering, Bertram
    Stebila, Douglas
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (02) : 151 - 171
  • [40] Cryptanalysis of Server-Aided Password-Based Authenticated Key Exchange Protocols
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Paik, Juryon
    Won, Dongho
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (02): : 47 - 57