Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1362622.1362644acmconferencesArticle/Chapter ViewAbstractPublication PagesscConference Proceedingsconference-collections
research-article

Scalable security for petascale parallel file systems

Published: 10 November 2007 Publication History

Abstract

Petascale, high-performance file systems often hold sensitive data and thus require security, but authentication and authorization can dramatically reduce performance. Existing security solutions perform poorly in these environments because they cannot scale with the number of nodes, highly distributed data, and demanding workloads. To address these issues, we developed Maat, a security protocol designed to provide strong, scalable security to these systems. Maat introduces three new techniques. Extended capabilities limit the number of capabilities needed by allowing a capability to authorize I/O for any number of client-file pairs. Automatic Revocation uses short capability lifetimes to allow capability expiration to act as global revocation, while supporting non-revoked capability renewal. Secure Delegation allows clients to securely act on behalf of a group to open files and distribute access, facilitating secure joint computations. Experiments on the Maat prototype in the Ceph petascale file system show an overhead as little as 6--7%.

References

[1]
M. K. Aguilera, M. Ji, M. Lillibridge, J. MacCormick, E. Oertli, D. Andersen, M. Burrows, T. Mann, and C. A. Thekkath. Block-level security for network-attached disks. In Proc. of FAST '03, 2003.
[2]
A. Amer, D. D. E. Long, J.-F. Pâris, and R. C. Burns. File access prediction with adjustable accuracy. In Proceedings of the International Performance Conference on Computers and Communication (IPCCC '02), Phoenix, Apr. 2002.
[3]
A. Azagury, R. Canetti, M. Factor, S. Halevi, E. Henis, D. Naor, N. Rinetzky, O. Rodeh, and J. Satran. A two layered approach for securing an object store network. In IEEE Security in Storage Workshop, 2002.
[4]
P. J. Braam. The Lustre storage architecture. http://www.lustre.org/documentation.htnil, Cluster File Systems, Inc., Aug. 2004.
[5]
A. Chaudhuri and M. Abadi. Formal analysis of dynamic, distributed file-system access controls. In Proc. of Int'l Conf. on Formal Techniques for Networked and Distributed Systems, Sep. 2006.
[6]
W. Dai. Crypto++ version 5.4. http://www.cryptopp.com, 2006.
[7]
J. Dean and S. Ghemawat. MapReduce: Simplified data processing on large clusters. In Proc. OSDI '04, Dec. 2004.
[8]
M. Factor, D. Nagle, D. Naor, E. Riedel, and J. Satran. The OSD security protocol. In Proc. 3rd IEEE Security in Storage Workshop, 2005.
[9]
K. Fu. Group sharing and random acces in cryptographic storage file systems. Master's thesis, MIT, June 1999.
[10]
S. Ghemawat, H. Gobioff, and S.-T. Leung. The Google file system. In Proc. SOSP '03, Oct. 2003.
[11]
G. A. Gibson, et al. A cost-effective, high-bandwidth storage architecture. In Proc. 8th ASPLOS, Oct. 1998.
[12]
H. Gobioff. Security for a High Performancu Commodity Storage Subsystem. PhD thesis, Carnegie Mellon University, July 1999.
[13]
E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh. SiRiUS: Securing remote untrusted storage. In Proc. of the 2003 Network and Distributed System Security Symposium, Feb. 2003.
[14]
D. Hitz, B. Alliso, A. Borr, R. Hawley, and M. Muhlestein. Merging NT and UNIX Filesystem Permissions. In Proc. of the USENIX Windows NT Symposium, Aug. 1998.
[15]
J. H. Howard, M. L. Kazar, S. G. Menees, D. A. Nichols, M. Satyanarayanan, R. N. Sidebotham, and M. J. Wes. Scale and performance in a distributed file system. ACM Trans. on Computer Systems, 6(1):51--81, Feb. 1988.
[16]
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: scalable secure file sharing on untrusted storage. In Proc. of FAST '03, Mar. 2003.
[17]
A. Leung and E. L. Miller. Scalable security for large, high performance storage systems. In Proc. 2nd Workshop on Storage Security and Survivability, 2006.
[18]
H. M. Levy. Capability-Based Computer Systems. Butterworth-Heinemann, Newton, MA, USA, 1984.
[19]
R. C. Merkle. A digital signature based on a conventional encryption function. In Advances in Cryptology - Crypto '87, pages 369--378, 1987.
[20]
E. L. Miller, D. D. E. Long, W. E. Freeman, and B. C. Reed. Strong security for network-attached storage. In Proc. of FAST '02, Jan. 2002.
[21]
D. Nagle, D. Serenyi, and A. Matthews. The Panasas ActiveScale storage cluster---delivering scalable high bandwidth storage. In Proc. of SC04, Nov. 2004.
[22]
B. C. Neumann, J. G. Steiner, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proc. Winter USENIX Conference, 1988.
[23]
R. A. Oldfleld, A. B. Maccabe, S. Arunagiri, T. Kordenbrock, R. Riesen, L. Ward, and P. Widener. Lightweight I/O for scientific applications. Tech report SAND2006--3057, Sandia National Lab, May 2006.
[24]
C. A. Olson and E. L. Miller. Secure capabilities for a petabyte-scale object-based distributed file system. In Proc. of the 1st ACM Workshop on Storage Security and Survivability, Nov. 2005.
[25]
B. C. Reed, E. G. Chron, R. C. Burns, and D. D. E. Long. Authenticating network-attached storage. In Proc. of Hot Interconnects VII, Aug. 1999.
[26]
J. T. Regan and C. D. Jensen. Capability file names: Separating authorisation from user management in an internet file system. In Proc. of the Tenth USENIX Security Symposium, Aug. 2001.
[27]
O. Rodeh and A. Teperman. zFS: a scalable distributed file system using object disks. In Proc. Mass Storage Systems and Technologies Conf., 2003.
[28]
Scalable I/O Project. http://www.llnl.gov/icc/lc/siop/, 2006.
[29]
F. Schmuck and R. Haskin. GPFS: A shared-disk file system for large computing clusters. In Proc. of FAST '02, Jan. 2002.
[30]
A. Singh, S. Gopisetty, L. Duyanovich, K. Voruganti, D. Pease, and L. Liu. Security vs performance: Tradeoffs using a trust framework. In Proc. Conf. on Mass Storage Systems and Technologies, 2005.
[31]
F. Wang, et al. File system workload analysis for large scale scientific computing applications. In Proc. Conference on Mass Storage Systems and Technologies, Apr. 2004.
[32]
R. O. Weber. Information technology---SCSI object-based storage device commands (OSD). Technical Council Proposal Document T10/1355-D, Technical Committee T10, Aug. 2002.
[33]
S. A. Weil, S. A. Brandt, E. L. Miller, D. D. E. Long, and C. Maltzahn. Ceph: A scalable, high-performance distributed file system. In Proc. of OSDI '06, 2006.
[34]
S. A. Weil, S. A. Brandt, E. L. Miller, and C. Maltzahn. CRUSH: Controlled, scalable, decentralized placement of replicated data. In Proc. of SC06, Nov. 2006.
[35]
B. Welch. POSIX IO extensions for HPC. In Proc. of FAST '05, Dec. 2005.
[36]
E. Wobber, M. Abadi, A. Birrell, and B. Lampson. Access control subsystem and method for distributed computer system using locally cached authentication credentials. U. S. Patent 5, 235, 642, Aug. 1993.
[37]
Y. Zhu and Y. Hu. Snare: A strong security scheme for network-attached storage. In Proc. of the 22nd Symp. on Reliable Distributed Systems, 2003.

Cited By

View all
  • (2024)Hierarchical password capabilitiesInternational Journal of Parallel, Emergent and Distributed Systems10.1080/17445760.2024.237631639:5(572-588)Online publication date: 9-Jul-2024
  • (2022)Infusing pub-sub storage with transactionsProceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems10.1145/3538643.3539739(23-30)Online publication date: 27-Jun-2022
  • (2022)Cryptographic pointers for fine-grained file access securityInformation Security Journal: A Global Perspective10.1080/19393555.2022.203336531:3(359-375)Online publication date: 28-Feb-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SC '07: Proceedings of the 2007 ACM/IEEE conference on Supercomputing
November 2007
723 pages
ISBN:9781595937643
DOI:10.1145/1362622
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 November 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. capabilities
  2. high-performance computing
  3. scalability
  4. secure object-based storage

Qualifiers

  • Research-article

Funding Sources

Conference

SC '07
Sponsor:

Acceptance Rates

SC '07 Paper Acceptance Rate 54 of 268 submissions, 20%;
Overall Acceptance Rate 1,516 of 6,373 submissions, 24%

Upcoming Conference

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Hierarchical password capabilitiesInternational Journal of Parallel, Emergent and Distributed Systems10.1080/17445760.2024.237631639:5(572-588)Online publication date: 9-Jul-2024
  • (2022)Infusing pub-sub storage with transactionsProceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems10.1145/3538643.3539739(23-30)Online publication date: 27-Jun-2022
  • (2022)Cryptographic pointers for fine-grained file access securityInformation Security Journal: A Global Perspective10.1080/19393555.2022.203336531:3(359-375)Online publication date: 28-Feb-2022
  • (2019)SpeicherProceedings of the 17th USENIX Conference on File and Storage Technologies10.5555/3323298.3323315(173-190)Online publication date: 25-Feb-2019
  • (2019)Practical Cyber-Security Solutions for the Science DMZPractice and Experience in Advanced Research Computing 2019: Rise of the Machines (learning)10.1145/3332186.3332213(1-6)Online publication date: 28-Jul-2019
  • (2019)Multitenant Access Control for Cloud-Aware Distributed FilesystemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2017.271583916:6(1070-1085)Online publication date: 1-Nov-2019
  • (2018)Scalable Metadata Management Techniques for Ultra-Large Distributed Storage Systems -- A Systematic ReviewACM Computing Surveys10.1145/321268651:4(1-37)Online publication date: 31-Jul-2018
  • (2018)PesosProceedings of the Thirteenth EuroSys Conference10.1145/3190508.3190518(1-17)Online publication date: 23-Apr-2018
  • (2016)Distributed system configuration management using Markov logic networksInternational Journal of Autonomic Computing10.1504/IJAC.2016.0820302:2(137-154)Online publication date: 1-Jan-2016
  • (2016)Authenticated Key Exchange Protocols for Parallel Network File SystemsIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2015.238844727:1(92-105)Online publication date: 1-Jan-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media