Browse > Article
http://dx.doi.org/10.6109/jkiice.2008.12.2.269

A Secure Ubiquitous Storage System for Mobile Devices  

They, Yu-Shu (동서대학교 디자인&IT 전문대학원)
Lee, Ern-Yu (동서대학교 디자인&IT 전문대학원)
Lee, Hoon-Jae (동서대학교 컴퓨터공학과)
Lim, Hyo-Taek (동서대학교 컴퓨터공학과)
Abstract
The rapid growth of ubiquitous technology has increased the demand of storage capacity in mobile computing. iSCSI(Internet Small Computer Interface), a virtual storage protocol would be one of the possible solutions to resolve this problem. However, the insecure nature of this protocol makes it vulnerable to malicious attacks. In this paper, we aims to design and propose a new secure lightweight iSCSI-based virtual storage scheme for mobile devices. Suitable security mechanisms are considered in the design of our proposed solution in order to overcome existing security problems in iSCSI. Relevant experiments are tarried out and the results revealed that the efficiency of proposed algorithm in which it introduces over 100% Read/Write performance improvement compared with the IPsec approach.
Keywords
Security; Virtual Storage; iSCSI; Cryptography; Mobile Computing; Ubiquitous;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Wu: The Secure Remote Password Protocol, Proceedings of the Internet Society Symposium on Network and Distributed System Security, NDSS 98, San Diego, California. March 1998, PP. 97-111
2 S. Kent and R. Atkinson and.: IP Encapsulating Security Payload (ESP), Request For Comments 2406, November 1998
3 Jail Arkko and Pekka Nikander.: Limitations of IPsec Policy Mechanisms, In Security Protocols, Eleventh International Workshop, Cambridge, UK, April 2003
4 Threaded I/O Tester, http://sourceforge.net/projects/ tiobench/
5 IEEE Standard 1363.2 Study Group. Password-Based Public-Key Cryptography, http://grouper.ieee.org/groups/ 1363/passwdPK
6 M. Bellare and C. Namprempre.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, Lecture Notes In Computer Science, Vol. 1976, pp. 531- 545
7 K. Lauter, "The advantages of Elliptic Curve Cryptography For Wireless Security", IEEE Wireless Communications, vol. 11, no. 1, Feb 2004, PP. 62-67
8 Shuang-Yi Tang, Ying-Ping Lu, David H.C Du.: Performance Study of Software-Based iSCSI Security, Proceedings of the First InternationalIEEE Security in Storage Workshop, December 11, 2002
9 S. Kent and R. Atkinson: IP Authentication Header, Request For Comments 2402, November 1998
10 J. Satran, K. Meth, C. Sapuntzakis, M. Chadalapaka, E. Zeidner.: Internet Small Computer Systems Interface (iSCSI), Request For Comments 3720, April 2004
11 B. Aboba, J. Tseng, J. Walker, V. Rangan, and F. Travostino.: Securing Block Storage Protocols over IP, Request For Comments 3723, April 2004
12 Hyotaek Lim, Saebom Choi.: Design and Implementation of iSCSI-based Virtual Storage System for Mobile Health Care, HEALTHCOM 2005, Jun. 2005, PP 37-42
13 National Institute of Standards and Technology, FIPS-180-2: Secure Hash Standard (SHS), August 2002
14 S. Kent and R. Atkinson.: Security Architecture for the Internet Protocol, Request For Comments 2401, November 1998
15 D. Harkins and D. Carrel.: The Internet Key Exchange (IKE), Request For Comments 2409, November 1998
16 UNH-iSCSI project, http://unh-iscsi.sourceforge.net/
17 K. Chen, M. Henricksen, W. Millan, J. Fuller, L. Simpson, E. Dawson, H. Lee, and S. Moon.: Dragon: A fast word based stream cipher, ECRYPT Stream Cipher Project Report 2005/2006
18 H. Krawczyk, M. Bellare and R. Canetti.: HMAC: Keyed-Hashing for Message Authentication, Internet Engineering Task Force, Request For Comments 2104, 1997