International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control

Authors:
Shai Halevi
Paul A. Karger
Dalit Naor
Download:
URL: http://eprint.iacr.org/2005/169
Search ePrint
Search Google
Abstract: This work is concerned with the security of the standard T10 OSD protocol, a capability-based protocol for object stores designed by the OSD SNIA working group. The Object Store security protocol is designed to provide access control enforcement in a distributed storage setting such as a Storage Area Network (SAN) environment. In this work we consider in particular the ability of the OSD protocol to enforce *confinement*, which is the property that even misbehaving participants can not leak secret information across predefined boundaries. We observe that being a "pure capability" protocol, the plain vanilla OSD protocol is incapable of enforcing confinement. We show, however, that given a trustworthy infrastructure for authentication and secure channels, the protocol can be used in a manner that achieves the desired property (and does not require any change in the message format). Thus we demonstrate that object stores can in principle be used in a standard fashion in applications that require protection against leakage of secret data. Having identified a problem and proposed a solution, we proceed to prove formally that the proposed protocol indeed meets all its security goals. In the process we refine common cryptographic models in order to be able to reason about confinement, and then devise a precise model for a distributed capability-based access-control mechanism. To our knowledge, this is the first time such a model for access-control is defined in a cryptographic setting, and defining it highlights what can and cannot be achieved by such mechanisms.
BibTeX
@misc{eprint-2005-12505,
  title={Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control},
  booktitle={IACR Eprint archive},
  keywords={applications / foundations, access-control, adaptive corruptions},
  url={http://eprint.iacr.org/2005/169},
  note={ shaih@alum.mit.edu 12942 received 7 Jun 2005, last revised 8 Jun 2005},
  author={Shai Halevi and Paul A. Karger and Dalit Naor},
  year=2005
}