Data Integrity Checking for iSCSI with Dm-verity
With the ever increasing popularity of web service and e-commerce, there is a high demand on data storage. Because of the development of Internet infrastructure and the low cost of deployment, implementing storage over IP has become a trend. For the utili
- PDF / 1,723,032 Bytes
- 7 Pages / 439.37 x 666.142 pts Page_size
- 84 Downloads / 199 Views
Abstract With the ever increasing popularity of web service and e-commerce, there is a high demand on data storage. Because of the development of Internet infrastructure and the low cost of deployment, implementing storage over IP has become a trend. For the utilization of network storage, one important issue is the way to achieve data integrity. Usually, the application of Internet Small Computer System Interface (iSCSI), which is a kind of network storage technology, is to store some read-only or important data remotely. I/O requests, which may cause data loss and data error, are frequent in a traditional distributed network storage system like R. Zhou Z. Ai J. Hu Q. Liu Q. Zhou (&) School of Information Science and Engineering, Lanzhou University Lanzhou, Lanzhou, People’s Republic of China e-mail: [email protected] R. Zhou e-mail: [email protected] Z. Ai e-mail: [email protected] J. Hu e-mail: [email protected] Q. Liu e-mail: [email protected] X. Wang School of Science, Lanzhou University of Technology, Lanzhou, People’s Republic of China e-mail: [email protected] H. Jiang Dept. of Computer Science, Arkansas State University, Arkansas, USA e-mail: [email protected] K.-C. Li Dept. of Computer Science and Information Engineering (CSIE), Providence University, Taichung, Taiwan e-mail: [email protected]
Y.-M. Huang et al. (eds.), Advanced Technologies, Embedded and Multimedia for Human-centric Computing, Lecture Notes in Electrical Engineering 260, DOI: 10.1007/978-94-007-7262-5_79, Ó Springer Science+Business Media Dordrecht 2014
691
692
R. Zhou et al.
iSCSI. In this paper, the data integrity of iSCSI is analyzed and Dm-verity mechanism is utilized to provide read-only transparent integrity checking for iSCSI, which could avert data loss and data error, increasing overall system reliability. Keywords Dm-verity
iSCSI Data integrity
Introduction Dm-verity [1] stands for device-mapper verity, which aims to provide read-only transparent integrity checking of block devices. It was originally developed by Google Chromium OS team and introduced later in Linux kernel 3.4.0. Dm-verity is based on device-mapper [2] used to verify the integrity of the root filesystem on boot and supported in many applications, such as LVM, RAID, and multi-path. The core component of dm-verity mechanism is a cryptographic hash tree, in which the leaf nodes of the tree store data blocks, so the hash nodes of the intermediary nodes are calculated based on all of its child nodes and hash function. When some data blocks are accessed, related hash nodes will be verified. In case one of hash nodes fails in the verification, the access will be denied. Therefore, dm-verity could ensure the integrity of data blocks. iSCSI, is an IP based network storage standard for linking data storage facilities. Also like IP-SAN (Storage Area Networks), iSCSI is a standard to encapsulate one SCSI command into a TCP/IP (Ethernet) packet, while users can access the storage system with commodity IP devices only. There are some security issues in iSCSI,
Data Loading...