The paper presents analysis of different methods used to protect IP storage systems. The problem is, if the existing tools and methods for securing common Internet services like WWW, VoIP are suitable to IP storage system protection? The necessary security services such as: authentication, integrity and encryption may be provided in many different ways. It is necessary to select optimal method for a given application. The main part of the paper is related to evaluation of various IP storage systems that utilize iSCSI protocol for transfer and IPSec protocol for protection. Several methods and implementations of security systems with different crypto module locations (client, server, storage medium) and with different implementations (software or hardware) are examined. The following attributes of the systems are analyzed: security level, performance/throughput overhead, cost, flexibility. © 2012 Springer-Verlag.
CITATION STYLE
Bilski, T. (2012). IP storage security analysis. In Communications in Computer and Information Science (Vol. 291 CCIS, pp. 216–228). https://doi.org/10.1007/978-3-642-31217-5_24
Mendeley helps you to discover research relevant for your work.