Title :
Two-Layered Access Control for Storage Area Network
Author :
Tao, Cai ; Shiguang, Ju ; DeJiao, Niu
Author_Institution :
Comput. Dept., JiangSu Univ., Zhenjiang, China
Abstract :
Access control is important to protect for storage area network. Current access control needed large time and space overhead, and it would make large I/O performance loss of storage area network. The artificial immune algorithm can efficiently detect abnormal access request of storage area network, so the two-layered access control is presented for storage area network. The structure of two-layered access control is given, it contains two kinds of modules such as the top access control module in metadata server and the lower access control module in intelligent disk. The distribution strategy for two-layered access control is presented. The top access control module in metadata server generates all detectors and preserves a majority of them. The lower access control module preserves a small number of detectors. Then it realizes a network access request inspection strategy with a center of top access control module. The number-type detector is used to instead of binary string detector and the numerical-type detector generating algorithm is given, they are used to avoid binary string detector enumeration and access request inspection by bit. Using B-tree to create the index of number-type detector and selecting the number in one-dimensional numerical interval different with legal access request as detector. The detector distribution algorithm is presented, clustering the detector and intelligent disk, and distributing the detectors among lower access control modules. Analyzing the function, overhead and accuracy of two-layered access control strategy. It proves that the two-layered access control strategy can inspect access request with low time and space overhead and high accuracy.
Keywords :
artificial immune systems; authorisation; meta data; storage area networks; trees (mathematics); B-tree; I/O performance loss; abnormal access request; artificial immune algorithm; binary string detector; detector clustering; detector distribution algorithm; distribution strategy; intelligent disk; legal access request; metadata server; network access request inspection strategy; number-type detector; numerical-type detector; space overhead; storage area network; time overhead; two-layered access control; Access control; Clustering algorithms; Detectors; Inspection; Intelligent control; Intelligent structures; Network servers; Performance loss; Protection; Storage area networks; access control; storage area network; the artificial immune algorithm;
Conference_Titel :
Grid and Cooperative Computing, 2009. GCC '09. Eighth International Conference on
Conference_Location :
Lanzhou, Gansu
Print_ISBN :
978-0-7695-3766-5
DOI :
10.1109/GCC.2009.55