Font Size: a A A

Design And Implementation Of Secure Access Control Based On Ceph Distributed Storage System

Posted on:2017-11-24Degree:MasterType:Thesis
Country:ChinaCandidate:S H LingFull Text:PDF
GTID:2348330491464253Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In nearly 20 years, with the constant development of computer computing environment, distributed storage system is widely used. However there is no security function of the current distributed storage file system. Therefore, the research on the safety performance of the distributed storage system design has important significance. So it is very valuable to research the safety performance of the distributed storage system design.The security model is analyzed in this paper. It is used in distributed storage, using safety technical such as Symmetric key authentication and certificate. When the storage size and the file object data are large, it will seriously influence on the performance of the storage system to read and write, therefore the model is not suitable for large-scale distributed file system. Based on the analysis and summary of system data access patterns, a security model is presented based on Role-Based policies Access Control theory. The main research is realized:first, using the asymmetric keys for authentication. Second, optimizing the RSA encryption algorithm and improving efficiency, thus the speed of authentication will be improved. Third, the role authorization is certificated according to the regular of data access. Then, it is implemented RCeph, the access control security model, based on the open source code of storage system.Finally, the threat that security storage system may encounter be analyzed, the results show that the access control model which designed and implemented based on Privilege could prevent these safety problems well. IO rate test of the storage system experimental results show that the access security model based on Ceph, balance the security and performance in reading and writing of distribution system. It is more suitable for the large-scale distributed storage system.
Keywords/Search Tags:Storage memory, Security protocol, Seeurity authentication module
PDF Full Text Request
Related items