Nt1330 Unit 3 Data Protection Paper

Words: 1585
Pages: 7

The rapid increase of data and data sharing have been motivated an expansion in distributed storage foundation. The need for perceptive data protection and the capacity to handle extensive data sets have aided the research and development of secure and scalable storage systems. This paper identifies primary security issues and prerequisites of data protection related to distributed data storage systems. I classify the security services and techniques in existing or proposed storage systems.
Storage centric Data Protection:
Network Attached Storage Devices:
Network attached storage device is a distributed file system that attempts to expand security by attaching the storage device straightaway to the network and eliminating the file server
…show more content…
A capability is a token that grant the user the access rights specified in that token. It has three main players: untrusted users, file manager, and storage devices. The file manager makes control access decisions and retains the responsibility for administering the namespace and the access control policy of file system. The file manager also stores an access control list and shares a unique symmetric key with each storage device. Each user is authenticated by storage devices that uses information provided by communication link between the file manager. The storage devices also implement the file manager ‘s access control decisions
The User sends a request for an object to the file manager, when he wants to access the file. On the receipt of the User’s request, the file manager authenticates the user and generates a capability key for that user. The Capability key is derived by generating a MAC of the User’s public credentials using the key shared between the file manager and the storage device that stores the request object. Apart from other’s entries, the user’s public credentials contain the object-ID, the access rights of that user for the requested object and the expiry time of the capability