Skip to main content

Security Issues in Network File Systems

  • Conference paper
Book cover Computational Science and Its Applications – ICCSA 2004 (ICCSA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3043))

Included in the following conference series:

Abstract

This paper studies network file system’s security requirements, and focuses on security performance constraints. We review security implementations in both, distributed file systems and pure network-based file systems, focusing on security services included in NFSv4’s proposed standard. Finally, we evaluate the tools being used to preserve data confidentiality, integrity and availability in computer communications, in order to evaluate whether they would be suitable for their use in network file systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Satyanarayanan, M.: Distributed Systems, 2nd edn., pp. 353–383. Addison-Wesley – ACM Press (1995)

    Google Scholar 

  2. Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 23–35 (1978)

    Google Scholar 

  3. Sandberg, R., Goldberg, D., Kleiman, S., Walsh, D., Lyon, B.: Design and Implementation of the SUN Network File System. In: Proceedings of the Summer Usenix Conference (1986)

    Google Scholar 

  4. Satyanarayanan, M.: Integrating Security in Large Distributed Systems. ACM Transactions on Computer Systems (1989)

    Google Scholar 

  5. Coulouris, G., Dollimore, J., Kindberg, T.: Distributed Systems: Concepts and Design, 2nd edn., pp. 197–249. Addison-Wesley, Reading (1994)

    Google Scholar 

  6. Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems, pp. 51–71, 115–133. Wiley & Sons, Chichester (2001)

    Google Scholar 

  7. Schneier, B.: Applied Cryptography, 2nd edn. Wiley & Sons, Chichester (1996)

    Google Scholar 

  8. Shepler, S., Callaghan, B., Robinson, D., Thurlow, R., Beame, C., Eisler, M., Noveck, D.: Network File System (NFS) version 4 Protocol – Proposed Standard. RFC 3530 (2003)

    Google Scholar 

  9. Eisler, M.: NFS Version 2 and Version 3 Security Issues and the NFS Protocol’s Use of RPCSEC_GSS and Kerberos V5, RFC 2623 (1999)

    Google Scholar 

  10. Callaghan, B., Pawlowski, B., Staubach, P.: NFS Version 3 Protocol Specification, RFC 1813 (1995)

    Google Scholar 

  11. CERT® Coordination Center, CERT® Advisory CA-1994-15 NFS Vulnerabilities, http://www.cert.org/advisories/CA-1996-09.html (1997)

  12. SANS Institute, The Twenty Most Critical Internet Security Vulnerabilities, Version 4.0, http://www.sans.org/top20/ (2003)

  13. AusCERT: UNIX Security Checklist v2.0, http://www.auscert.org.au (2001)

  14. Eisler, M., Chiu, A., Ling, L.: RPCSEC_GSS Protocol Specification. RFC 2203 (1997)

    Google Scholar 

  15. Patterson, D., Gibson, G., Katz, R.: A Case for Redundant Arrays of Inexpensive Disks (RAID). In: Proceedings of the International Conference on Management of Data (1988)

    Google Scholar 

  16. Bridis, T.: Powerful attack cripples majority of key Internet computers (2002), http://www.securityfocus.com/news/1400

  17. Knowles, D., Perriot F., Szor, P.: W32.Blaster.Worm Security Response, http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html (2003)

  18. Ferraiolo, D., Kuhn, R.: An Introduction to Role-Based Access Control, http://csrc.nist.gov/rbac/NIST-ITL-RBAC-bulletin.html NIST/ITL Bulletin (1995)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Izquierdo, A., Sierra, J.M., Hernández, J.C., Ribagorda, A. (2004). Security Issues in Network File Systems. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_94

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24707-4_94

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22054-1

  • Online ISBN: 978-3-540-24707-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics