Separating key management from file system security
- 12 December 1999
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 33 (5) , 124-139
- https://doi.org/10.1145/319344.319160
Abstract
No secure network file system has ever grown to span the Internet. Existing systems all lack adequate key management for security at a global scale. Given the diversity of the Internet, any particular mechanism a file system employs to manage keys will fail to support many types of use.We propose separating key management from file system security, letting the world share a single global file system no matter how individuals manage keys. We present SFS, a secure file system that avoids internal key management. While other file systems need key management to map file names to encryption keys, SFS file names effectively contain public keys, making them self-certifying pathnames. Key management in SFS occurs outside of the file system, in whatever procedure users choose to generate file names.Self-certifying pathnames free SFS clients from any notion of administrative realm, making inter-realm file sharing trivial. They let users authenticate servers through a number of different techniques. The file namespace doubles as a key certification namespace, so that people can realize many key management schemes using only standard file utilities. Finally, with self-certifying pathnames, people can bootstrap one key management mechanism using another. These properties make SFS more versatile than any file system with built-in key management.Keywords
This publication has 12 references indexed in Scilit:
- The Exact Security of Digital Signatures-How to Sign with RSA and RabinPublished by Springer Nature ,1996
- A coherent distributed file cache with directory write-behindACM Transactions on Computer Systems, 1994
- File-system development with stackable layersACM Transactions on Computer Systems, 1994
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- Authentication in distributed systemsACM Transactions on Computer Systems, 1992
- The design and implementation of a log-structured file systemPublished by Association for Computing Machinery (ACM) ,1991
- Scalable, secure, and highly available distributed file accessComputer, 1990
- Integrating security in a large distributed systemACM Transactions on Computer Systems, 1989
- Scale and performance in a distributed file systemACM Transactions on Computer Systems, 1988
- A Global Authentication Service without Global TrustPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986