Skip to main content

2014 | OriginalPaper | Buchkapitel

Data Integrity Checking for iSCSI with Dm-verity

verfasst von : Rui Zhou, Zhu Ai, Jun Hu, Qun Liu, Qingguo Zhou, Xuan Wang, Hai Jiang, Kuan-Ching Li

Erschienen in: Advanced Technologies, Embedded and Multimedia for Human-centric Computing

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the ever increasing popularity of web service and e-commerce, there is a high demand on data storage. Because of the development of Internet infrastructure and the low cost of deployment, implementing storage over IP has become a trend. For the utilization of network storage, one important issue is the way to achieve data integrity. Usually, the application of Internet Small Computer System Interface (iSCSI), which is a kind of network storage technology, is to store some read-only or important data remotely. I/O requests, which may cause data loss and data error, are frequent in a traditional distributed network storage system like iSCSI. In this paper, the data integrity of iSCSI is analyzed and Dm-verity mechanism is utilized to provide read-only transparent integrity checking for iSCSI, which could avert data loss and data error, increasing overall system reliability.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Kaufman C, Perlman R, Speciner M (2002) Network security: private communication in a public world, 2nd edn. Prentice Hall, New Jersey Kaufman C, Perlman R, Speciner M (2002) Network security: private communication in a public world, 2nd edn. Prentice Hall, New Jersey
5.
Zurück zum Zitat Riedel E, Kallahalla M, Swaminathan R (2002) A framework for evaluating storage system security. In: The 1st USENIX Conference on File and Storage Technologies, pp 15–30, USENIX Association, Berkeley, CA Riedel E, Kallahalla M, Swaminathan R (2002) A framework for evaluating storage system security. In: The 1st USENIX Conference on File and Storage Technologies, pp 15–30, USENIX Association, Berkeley, CA
6.
Zurück zum Zitat Di CY, Li KC, Hung JC, Yu Q, Zhou R, Hung CH, Zhou QG (2013) A case of security encryption storage system based on SAN environments: intelligent technologies and engineering systems lecture notes in electrical engineering, vol 234. Springer, Heidelberg, pp 27–32 Di CY, Li KC, Hung JC, Yu Q, Zhou R, Hung CH, Zhou QG (2013) A case of security encryption storage system based on SAN environments: intelligent technologies and engineering systems lecture notes in electrical engineering, vol 234. Springer, Heidelberg, pp 27–32
7.
Zurück zum Zitat Meth KZ, Satran J (2003) Design of the iSCSI protocol. In: The 20th IEEE/11th NASA Goddard Conference on Mass Storage Systems and Technologies (MSS’03), pp 116–122, IEEE Computer Society, Washington, DC Meth KZ, Satran J (2003) Design of the iSCSI protocol. In: The 20th IEEE/11th NASA Goddard Conference on Mass Storage Systems and Technologies (MSS’03), pp 116–122, IEEE Computer Society, Washington, DC
9.
Zurück zum Zitat Wu GF, Wu HH, Chang L (2011) On performance optimization of iSCSI SAN. In: 3rd International Conference On Information Technology and Computer Science (ITCS 2011), pp 430–433, ASME, New York Wu GF, Wu HH, Chang L (2011) On performance optimization of iSCSI SAN. In: 3rd International Conference On Information Technology and Computer Science (ITCS 2011), pp 430–433, ASME, New York
Metadaten
Titel
Data Integrity Checking for iSCSI with Dm-verity
verfasst von
Rui Zhou
Zhu Ai
Jun Hu
Qun Liu
Qingguo Zhou
Xuan Wang
Hai Jiang
Kuan-Ching Li
Copyright-Jahr
2014
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-7262-5_79

Neuer Inhalt