IP storage security analysis

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The paper presents analysis of different methods used to protect IP storage systems. The problem is, if the existing tools and methods for securing common Internet services like WWW, VoIP are suitable to IP storage system protection? The necessary security services such as: authentication, integrity and encryption may be provided in many different ways. It is necessary to select optimal method for a given application. The main part of the paper is related to evaluation of various IP storage systems that utilize iSCSI protocol for transfer and IPSec protocol for protection. Several methods and implementations of security systems with different crypto module locations (client, server, storage medium) and with different implementations (software or hardware) are examined. The following attributes of the systems are analyzed: security level, performance/throughput overhead, cost, flexibility. © 2012 Springer-Verlag.

Author supplied keywords

Cite

CITATION STYLE

APA

Bilski, T. (2012). IP storage security analysis. In Communications in Computer and Information Science (Vol. 291 CCIS, pp. 216–228). https://doi.org/10.1007/978-3-642-31217-5_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free