会议专题

The Comparisons between Public key and Symmetric key Cryptography in Protecting Storage Systems

As public key cryptographic operations are computationally expensive; it motivates a careful examination of the reasons of its usage and looking for symmetric key alternatives. In this paper, we present comparisons between public key and symmetric key cryptography in protecting storage and take some other factors, such as security, cost and environment etc. into consideration. At first, the comparisons between public key and symmetric key cryptography is presented. Then, the security services that some famous storage systems provide and some symmetric key alternatives are discussed. We give the comparisons of some practice storage systems and trade off some other parameters. Finally, some general conclusions are made about the secure storage systems for system designers.

storage system authentication authorization confidentiality integrity key management

Lanxiang Chen Shuming Zhou

School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350108, China Key Lab of Network Security and Cryptology, Fuzhou 350108, China

国际会议

The 2010 International Conference on Computer Application and System Modeling(2010计算机应用与系统建模国际会议 ICCASM 2010)

太原

英文

494-502

2010-10-22(万方平台首次上网日期,不代表论文的发表时间)