Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

MAZE Security Protocol for Self Securing S4 Storage Server

Print
PDF
IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies
© 2012 by IJCA Journal
ICNICT - Number 5
Year of Publication: 2012
Authors:
Alok G
N R Sunitha

Alok G and N R Sunitha. Article: MAZE Security Protocol for Self Securing S4 Storage Server. IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies ICNICT(5):13-17, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Alok G and N R Sunitha},
	title = {Article: MAZE Security Protocol for Self Securing S4 Storage Server},
	journal = {IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies},
	year = {2012},
	volume = {ICNICT},
	number = {5},
	pages = {13-17},
	month = {November},
	note = {Full text available}
}

Abstract

Storage area network (SAN) is an emerging technology in the industry with the capability to handle ever growing requirement for data storage in any enterprise. The flexibility provided by storage area network also opens up major security concerns. The security protocols designed for self securing S4 storage server have focused on recovery from intruder attacks and corruption of data by extensive reliance on Audit logs, History pool and Journal based metadata; after the act of intrusion is detected. In this paper, we propose MAZE security protocol, which uses Decoy Documents to isolate the intruder on the fly, in the act, at the time of crime. We also analyze the efficiency of the protocol on a virtual test bed.

References

  • Adam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A. N. Soules, Garth R. Goodson, Gregory R. Ganger "Storage-based Intrusion Detection: Watching storage activity for suspicious behavior" - Proceedings of 12th USENIX Security Symposium, Washington, D. C. , Aug 4-8, 2003. Supercedes Carnegie Mellon University SCS Technical Report CMU-CS-02-179, September 2002.
  • John. D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig A. N. Soules, and Gregory R. Ganger. Self-securing storage: protecting data in compromised systems. In Proceedings of the 4th Symposium on Operating Systems Design and Implementation, October 2000.
  • Bowen, B. M. , Kemerlis, V. P. , Prabhu, P. , Keromytis, A. D. , Stolfo, S. J. : "Automating the injection of believable decoys to detect snooping. " In: Proceedings of the third ACM Conference on Wireless Network Security (WiSec). pp. 81{86 (2010)
  • "Storage Area Networks: Data Security and Fabric Management" – White Paper Product Management March 2002 Datalink.
  • Bowen, B. M. , Hershkop, S. , Keromytis, A. D. , Stolfo, S. J. : Baiting Inside Attackers Using Decoy Documents. In: Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm). pp. 51-70 (September 2009)
  • Bowen, B. M. ; Ben Salem, M. ; Hershkop, S. ; Keromytis, A. D. ; Stolfo, S. J. ; , "Designing Host and Network Sensors to Mitigate the Insider Threat," Security & Privacy, IEEE , vol. 7, no. 6, pp. 22-29, Nov. -Dec. 2009
  • Brian M. Bowen, "Design and Analysis of Decoy Systems for Computer Security" - Columbia University 2011.
  • Tate, J. , Lucchese, F. , and Moore, R. Introduction to Storage Area Networks, United States: Vervante, September 2006.