Check out the new USENIX Web site. next up previous
Next: 2.1 The basic capability Up: Block-Level Security for Network-Attached Previous: 1 Introduction


2 Block-based security with modest RAM

We assume that the server and disks can be trusted--they are responsible for setting and enforcing security policies under our approach. However, we assume clients can be compromised and that the network is not secure, either from eavesdropping or spoofing. Under these conditions, our security ensures that attackers can access a user's data only by compromising a client machine logged into by that user. Should encryption be turned off for performance reasons, some privacy will be lost, as a wiretapper can see data read or written. The level of security we offer is similar to that of an NFS system that uses Kerberos for authentication, cryptographic checksums for integrity, and optional encryption for privacy.

Unforgeable, self-describing capabilities are the chief mechanism we employ for adding security to a NAD file system. We use the well-known idea of capabilities composed of two parts: a self-describing certificate and an associated secret. The secret is generated via a message authentication code (MAC) from the certificate and a hidden key known only to the server and the relevant disk [10,9,16,19]. This basic capability approach, reviewed in Section 2.1 below, is augmented by two new techniques which permit RAM requirements on the system's disks to be very modest: a revocation scheme based on capability groups, described in Section 2.2; and a defense against replay attacks using Bloom filters, described in Section 2.4.



Subsections
next up previous
Next: 2.1 The basic capability Up: Block-Level Security for Network-Attached Previous: 1 Introduction
Mark Lillibridge 2003-01-06