If an intruder uses a stolen account, the authentication sub-system will regard the intruder as a legitimate user. In order to filter out such illegal users, the storage system should be capable of the user activity diagnosis. This paper presents a novel anomaly detection scheme to monitor the user access activities using the artificial immune technique. When an access request violates the access control rule, it is regarded as Non-self, so as to provide some early warning tips to the storage security sub-system. Compared with the NIDS, the proposed scheme targets the anomaly detection at storage level and focuses on the read/write data requests. In the prophase of simulation, a set of optimal parameters of algorithm are fitted according to the mean convergence speed and detection efficiency. The simulation shows the proposed scheme can reach rather high detection rate and low false alarm rate, further validating its feasibility. Thus the storage anomaly detection would strengthen the storage early warning and improve the storage security.
KEYWORDS: Sensors, Data storage, Computer security, Detection and tracking algorithms, Databases, Target detection, Information security, Artificial intelligence, Network security, Rule based systems
The paper proposed a novel authentication method for networked storage using artificial immune technique, addressing
the storage security issue. Most authentication sub-systems adopt the positive identification to judge the user identity,
however if an intruder obtains some account information, he may crack the authentication sub-system using Rule-based
Attack and do harm to the storage system. Aiming at this problem, we designed a negative authentication to improve
entrance security of storage system, where the identification data are stored in Non-self space so as to prevent the
intruder from discovering any account information. Additionally, the negative authentication sub-system can filter out
the unauthorized users. The experimental results showed that the proposed authentication method could be efficient in
detecting unauthorized user, so the negative authentication sub-system may improve the storage security.
KEYWORDS: Network security, Computer security, Artificial intelligence, Information security, Data storage, Computing systems, Sensors, Systems modeling, Pathogens, Defense and security
This paper proposed a theoretical framework for the networked storage system addressing the storage security. The immune system is an adaptive learning system, which can recognize, classify and eliminate 'non-self' such as foreign pathogens. Thus, we introduced the artificial immune technique to the storage security research, and proposed a full theoretical framework for storage security system. Under this framework, it is possible to carry out the quantitative evaluation for the storage security system using modeling language of artificial immune system (AIS), and the evaluation can offer security consideration for the deployment of networked storage system. Meanwhile, it is potential to obtain the active defense technique suitable for networked storage system via exploring the principle of AIS and achieve a highly secure storage system with immune characteristic.
The access time of Disk/RAID has not been improved as fast as the memory performance whose rate of improvement has been 25% per year and hence the disk access penalty is considerably increasing with each enhancement in the memory architecture. To solve the problem, a new kind of storage hierarchy, Volume Holographic Universal Storage Cache (short for VHUSC) is proposed. VHUSC acts as a layer between main memory and disk or disk array. VHUSC can lower the disk access latency, provide much higher I/O bandwidth and throughput, it thus greatly improve the I/O performance of computer system. In this paper, an application independent model based on queuing theory is proposed for the VHUSC performance evaluation. Based on this model, VHUSC and traditional disk/RAID performance is analyzed and compared. Result shows that in most cases VHUSC can improve the disk read/write performance by 1 order of magnitude, especially when the hit rate is larger than 99%, the performance can reach 2 orders of magnitude.
KEYWORDS: Mirrors, Compact discs, Data storage, Chlorine, Telecommunications, Data communications, Data storage servers, Computing systems, Lithium, Data modeling
CD mirror system can separate the reading from storing of CD information, enabling user to share CD resource with higher speed. Existing remote CD mirror system is generally based on NAS mode. NAS-based device accesses the data at file level and the data must pass through the file system layer, increasing the system burden; iSCSI system encapsulates SCSI commands over IP, which just corresponds with the transport mechanism of remote CD mirror system. Therefore, in this paper we have implemented a new remote CD mirror system by introducing iSCSI protocol and third-party transferring mode. With third-party transferring mode data information and control information are transferred independently, the data information is transferred by iSCSI protocol, and control information is transferred by TCP/IP protocol, so as to increase the network transfer rate. The result of experiment has showed that the CD mirror system can achieve higher data transfer rate and support more concurrent sessions relative to existing systems, and have better scalability using third-party transferring mode.
Acquiring 3D color model of human head is desired in many applications. In this paper, we introduce a scheme to obtain 3D color information of human head from image sequence in 3D laser color scanner. Structured light technology is employed to measure depth. We study the relationship among the object's images in different position. Synthesizing these information, we can obtain the shape of hair area from contour image. True color information of sample points can be acquired from the specified image in image sequence. The result of experiment is satisfactory.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.