Using Encryption to Increase the Security of
Network Storage
Mahesh M N
M.Tech Student (Network and Internet Engineering)
Department of Electronics and Communication Engineering
Sri Jayachamarajendra College of Engineering
Mysuru, India
Mahesh2789mn@gmail.com
Abstract- IT managers are working hard to ensure the
security and integrity of key organization’s data. Corruption of
data can occur due to purposeful attack from many sources,
including black hat hackers, terrorists, company competitors,
and disgruntled employees. Data can also be compromised by
accident, by careless or poorly trained employees. Whether
malicious or accidental, the consequences of a threat exploiting
vulnerability can be devastating to the enterprise. Inadequate
security can result in the disclosure of confidential data to
unauthorized recipients, loss of integrity due to damaged or
deleted data, and loss of access to the data
I. INTRODUCTION
To reduce the risks of exposing or damaging company data, IT
managers must evaluate all of their data storage security processes.
Organizations that are effectively protecting their data obtain many
benefits, including increased customer trust; reduced losses due to
fraud or theft; maintaining privacy and integrity of data while at
rest or in flight; and the ability to achieve compliance with industry
regulations.
Storage encryption is one of the core features of a storage
security strategy that is rapidly gaining popularity with enterprises
that process and store data. Storage encryption solutions use
encryption technologies to secure data whether it is online, backed
up, or archived, both in transit (data n flight) and on the storage
medium (data at rest). Storage encryption enables enterprises to
cost effectively protect the confidentiality of data stored in their
storage infrastructure networks. By encrypting stored data,
enterprises gain the ability to protect the company’s private data
from accidental or malicious intruders, reduce capital
expenditures, and achieve savings in data transport costs.
II. THE NEED TO ENCRYPT STORAGE DATA
The advantages of networked data storage technologies
such as network-attached storage (NAS) and storage area networks
(SAN) are well established, but having data on a network creates
significant security risks. Data that resides in a networked storage
environment can be much more vulnerable to unauthorized access,
theft, and misuse than data stored in direct-attached storage (DAS)
appliances. This is because aggregated storage in a SAN is not
designed to compartmentalize the data it contains. As a result of
pooling storage, data that originated in different applications or
company divisions becomes comingled when stored in the
network. Data backups, off-site mirroring, and other data
replication techniques further increase the risk of unauthorized
access to data from people both inside and outside the company
firewall.
With storage networks, a single security breach can threaten
much larger data repositories than isolated storage systems.
Curious or malicious insiders, administrators, partners, hackers,
contractors, and outsourced service providers can all gain access to
data quite easily. IT managers are seeking storage infrastructure
solutions that will help them minimize risks and achieve the
following goals.
Thyagaraja Murthy A
Associate Professor
Department of Electronics and Communication Engineering
Sri Jayachamarajendra College of Engineering
Mysuru, India
trmsjce@gmail.com
 Achieving internal and external compliance:
 Complying with external entities and laws, such as PCI,
SEC, GLBA, HIPAA,,and SOX
 Maintaining internal security policies and access controls
 Minimizing the risk of unauthorized access
 Securing intellectual property:
 Maintaining competitive advantage by securing the most
important business assets
 Protecting key data from internal and external attacks
 Reducing TCO:
 Achieving quick, easy,plug-in deployment
 Minimizing costly changes to storage infrastructure
 Securing data at rest and data in flight
Current technologies—such as firewalls, Intrusion Prevention
Systems (IPSs), and Virtual Private Networks (VPNs)—seek to
secure data assets by protecting the perimeter of the network. LUN
masking and zoning in SAN environments also attempt to address
concerns about security. Unfortunately, these targeted approaches
cannot adequately secure storage if data is still stored in clear text
(that is, data that is transferred or stored without cryptographic
protection). Encrypting data at rest on tape and disk as well as data
in transit significantly mitigates these threats and enables
enterprises to secure data while maintaining current service levels
for operations.
III. THREAT MODEL FOR DATA AT REST AND DATA
IN FLIGHT
Over the lifespan of data, nearly all media eventually leave
the owner’s control, either when it is decommissioned at its end of
life or end of lease or is returned for warranty or repair. Loss of
physical control of storage media includes all media types, such as
removable media such as tape cartridges, disk drives in servers,
and networked storage drives.
Even if the media is decommissioned due to end-of-life or
system failure, the data on that media may still be readable. For
example, data on the vast majority of failed hard drives can still be
read; even drives that were part of a striped array are also at risk.
Disk striping divides a body of data into blocks and spreads the
data blocks across several partitions on several hard disks, but in a
failure, some data remains. The typical stripe size in today’s arrays
is large enough to expose hundreds of customer names and social
security numbers. Some companies require data cleansing before
recycling all storage media. However, these methods do not
guarantee the elimination of the data.
These security processes can be ineffective if human
beings misplace or skip any media that need to be sanitized before
recycling. Even if all media are cleansed, overwriting media can
take hours or days, may miss reallocated portions of the media, or
may not work at all under certain failure conditions. There is also
no indication of when the processes are complete. It is clear that
most methods of data cleansing are imperfect. These issues and
ISBN-13: 978-1537033419
www.iaetsd.in
Proceedings of ICDER-2016
©IAETSD 201633
the increasing risks of data exposure have rapidly accelerated the
widespread interest in encryption. Encryption can automatically
secure the data when the media leave the owner’s control—without
dependence on humans and costly, time-consuming, and imperfect
processes.
IV. CHOOSING AN ENCRYPTIONSOLUTION
One of the most effective methods of protecting the
privacy of data is to encrypt it. Encryption is the process of
converting readable clear text into unreadable cipher text, which
can later be decrypted back into the original content. Encryption
technologies can be used to protect an organization's SAN, NAS,
tape, and iSCSI data stores. Storage security technology is based
on an array of encryption algorithms. However, all encryption
algorithms have finite periods of usability. As the existing
encryption algorithms age and processor power increases, today’s
algorithms become progressively more vulnerable to breaking.
Earlier encryption algorithms such as DES and 3DES, and hashing
algorithms such as MD5 and SHA-1, are now considered to be
insecure.
Effective encryption solutions should take advantage of the
strongest commercially available algorithms such as AES. It is also
important to consider the complete security of a
system—encryption is only as strong as its weakest link. If data is
encrypted using AES-256, but keys are stored in clear text and left
in an open operating system, it is fairly easy to compromise the
entire system. Because of the changing nature of encryption
standards, it is also important that the encryption solution can be
upgraded to address emerging standards without requiring full
hardware replacement.
 No performance impact: The solution should be able to
compress and encrypt data at wire speeds without a
requirement for additional CPU overhead.
 Ease of Installation: An effective solution should deploy
seamlessly into the current IT environment. Installation
should require zero downtime and not cause any disruption to
workflow. It should not require any modifications to the
hosts, servers, and applications, and it should not necessitate
forklift upgrades to storage.
 Strong Key Management: The solution should provide secure
encryption keys and maximize availability when needed.
 Scalability: As the amount of data grows, the solution should
scale cost effectively.
When selecting an encryption solution, it is also important
to make sure that the solution has gone through formal,
independent certification. The standard certification body for
encryption technologies is the National Institute of Standards and
Technology (NIST), which tests and certifies third-party products
against a standard called the Federal Information Processing
Standard (FIPS). Other certifications, most notably the
international Common Criteria standard, are also used to validate
that encryption products have been built properly. Without
independent validation, it is difficult to be sure that the products
perform as promised.
V. WHERE AND HOW TO IMPLEMENT ENCRYPTION
There are several choices for where and how to implement
encryption. Each method imposes some trade-offs for
performance, complexity, and ease of use. The following sections
examine the pros and cons of each method.
ENCRYPTION IN THE APPLICATIONOR DATABASE:
If it is possible to identify specific data that must be
protected, it may be possible to encrypt just the sensitive or
valuable data. For example, a database application could enable
encryption at the column level. The advantage of this type of
approach is that the amount of data being encrypted is minimized
so that the performance impact on the application is potentially
minimized. The challenges of this type of approach include the
ability to properly identify all fields that contain sensitive or
regulated data and ensuring that any changes to the application or
schema take into account whether they should be encrypted.
Because application encryption is specific to a given application, if
multiple applications require access to encrypted data it is difficult,
if not impossible, to find compatible solutions that use a common
key management infrastructure. Further, it is likely that one or
more of the applications will not natively support its own
encryption mechanism.
ENCRYPTION IN THE FILE SYSTEM OR OPERATING
SYSTEM
Several operating systems provide options for either
turning on encryption in the native file system or adding an
encryption facility on top of the native file system. Traditionally,
additional software may be installed on a server that enables the
user to encrypt and decrypt individual files. Performing selective
encryption may reduce the impact on performance. In addition, as
host processors in devices like laptops became more powerful, full
disk and full file system encryption have been introduced. The
advantage of using selective encryption by file is that it can reduce
the performance impact. However, users may have to be involved
in performing the encryption and decryption as an extra step. By
encrypting all files, users may not see the encryption and
decryption steps, but there is likely to be a performance impact.
Performing encryption in the servers provides the ability to
provision encryption processing where it’s needed. The downside
is that it will probably be intrusive to the operations of that server.
If encryption is done in software, performance on that server is
significantly affected whenever a nontrivial amount of data must
be encrypted. It may be possible for encryption is to be done in
specialized hardware added to these hosts, but there will be
downtime for each server to be shut down, have the coprocessor
installed, reboot, install the driver software (and perhaps reboot
again), test the applications, and bring it back on line. In large
enterprises with tens, hundreds, or thousands of servers, this could
be extremely invasive to operations. Further, because this
deployment does not happen instantaneously, IT must plan the
rollout very carefully. There will be periods when some servers are
encrypting data and others are unable to access it. Finally, it is
important to find a solution that supports allthe host configurations
(both hardware and OS) that the enterprise uses today and will use
in the future.
ENCRYPTION IN THE DEVICE DRIVER OR NETWORK
INTERFACE:
Data can be encrypted in the network interface, such as a
host bus adapter or network interface card. Some network cards
include dedicated hardware logic for accelerating the
cryptographic functions. The information is protected from the
server through the SAN to the storage. Currently, this type of
solution tends to focus on data in flight versus data at rest, where
there is a possibility of capturing data in flight and performing an
analysis to find the keys and access the data.
Temporary keys are used and periodically updated. When
solutions focus on data at rest, encryption keys protect data for
much longer periods of time. This requires that the length of the
key and strength of encryption are sized appropriately and that key
management includes the ability to maintain keys for long periods
of time
.
CENTRALIZED ENCRYPTION ON THE NETWORK:
Network-based encryption offers the benefits of
centralized encryption and key management and enabling
encryption on existing storage devices. The centralized approach to
encryption in the network uses one key vault and management
application to encrypt data for multiple types of heterogeneous
storage (disk and tape). Instead of buying several devices that
enable encryption for a given application, network-based solutions
encrypt data for multiple applications and use the same user
interface to manage encryption policies. Network-based
implementations enable encryption from a centralized location to
existing storage devices.
Without upgrading end devices, network-based encryption
can selectively encrypt data to meet the needs of the organization.
For SAN-based disk-based encryption, the user can configure
encryption at the logical unit (LUN) level so that only
specific application data is encrypted on large storage arrays. In
NAS-based encryption of online data on disk, the encryption is
ISBN-13: 978-1537033419
www.iaetsd.in
Proceedings of ICDER-2016
©IAETSD 201634
done at the network-share level. For tape-based encryption, data
encryption keys can be associated to individual tapes or tape pools
to refine the granularity of encryption. Although some initial
deployments added significant latency to the encryption process,
the latest generation of solutions adds a minimalamount of delay to
ensure that backup windows are maintained in tape applications.
With network-based encryption, users have the flexibility and
power to encrypt data on legacy storage devices and to encrypt
only the data than needs to be encrypted.
ENCRYPTION IN THE STORAGE DEVICE:
Self-encrypting storage devices embed encryption in the
storage device itself, providing full disk encryption so that
fine-grained data classification is not needed and the device can
leave the owner’s control securely. Neither the encryption key nor
the encrypted text ever leave the device, enhancing security,
greatly simplifying key management, and making the encryption
transparent to the OS, databases, and applications. Because the
encryption key does not leave the device, there is no need to track
or manage the encryption keys. Cryptographic processing within
the device can potentially have no measurable performance impact
on the system, and it allows the encryption to scale linearly
automatically as more storage is added to the system. All data can
be encrypted, with no performance degradation, so there is no need
to classify which data to encrypt. It’s easy to quickly and securely
erase the entire device by erasing the encryption key in the device,
without worry that there may be a copy of that encryption key
somewhere outside the device. The key has never left the device
and there is no other copy, so the proof of data destruction is the
execution of that single process.
The need to re encrypt data is minimized because the
encryption key doesn’t need to be changed when an administrator
leaves the job. Encrypting in the device may add cost to that
device, and the implementation schedule may affect the natural
replacement schedule of storage devices. However, this impact
may be offset by the fact that it is being implemented in standard
storage devices and cuts device decommissioning costs and
headaches.
DECIDING WHICH ENCRYPTION METHODTO USE:
Each method of encryption has its advantages and disadvantages.
The following table can help decide which approach is the best
choice for a given deployment:
A. Database or Application
Considerations:
 Is all sensitive data in one or two columns in a database?
 Will application performances be affected?
Advantages:
 Minimal performance impact on the application.
Challenges:
 Must identify all fields with sensitive or regulated data.
 Need to ensure that all changes to application or schema
include whether they should be encrypted.
 Difficult to find compatible solutions that use a common key
management infrastructure.
 Some applications may not natively support their own
encryption mechanism.
B. File System or Operating System
Considerations:
 Will it be uniform across all environments and operating
systems?
 Will performance be affected or disrupted?
Advantages:
 Provides the ability to provision encryption processing
where it is needed.
 May allow selective encryption.
Challenges:
 Users may have to be involved in invoking the encryption
and decryption as an extra step.
 If encryption is done in software, performance on that server
is significantly affected whenever a nontrivial amount of
data needs to be encrypted.
 Solution must support all host configurations (both hardware
and OS) that the enterprise uses today and will use in the
future.
 May affect performance.
C. Device Driver or Network Interface:
Considerations:
 Will scalability be an issue as data grows?
 Is port connectivity, rack space,or power an issue?
Advantages:
 Information is protected from the server through the SAN to
the storage.
Challenges:
 Current solutions tend to focus on data in flight versus data at
rest where there is a possibility of capturing data in flight and
performing an analysis to find the keys and access the data.
D. Network
Considerations:
 Will interoperability with other SAN devices be an issue?
 How many storage devices need to be protected?
Advantages:
 Enables encryption on existing storage devices
 Can selectively encrypt only the data than needs to be
encrypted.
Challenges:
 Some early solutions added latency to the encryption
process, but newer solutions add less than a millisecond of
delay to ensure that backup windows are maintained in tape
applications.
E. Storage Devices
Considerations:
 Will encryption work across all vendor storage (that is,
heterogeneous) environments?
 What kind of key management will be used?
Advantages:
 Provides full disk encryption.
 The device can leave the owner’s control securely.
 Simplifies key management.
 No significant performance impact to the system.
 Allows encryption to scale linearly automatically as more
storage is added to the system.
 No need to classify which data to encrypt.
Challenges:
 May not work across all vendor storage environments.
 May add cost to the device.
 Requires forklift upgrade of existing storage devices.
VI. NETAPP ENCRYPTION SOLUTIONS
Enterprises can now secure sensitive data across the entire
organization and manage stored data through NetApp’s
enterprise-wide foundation of control. NetApp storage security
systems deliver nondisruptive, comprehensive protection for
sensitive data across the enterprise, for both data at rest and data in
flight. NetApp storage solutions enable enterprises to protect
intellectual property and confidential information, more easily
comply with industry and government regulations, and preserve
company reputation by avoiding publicized loss of data.
ISBN-13: 978-1537033419
www.iaetsd.in
Proceedings of ICDER-2016
©IAETSD 201635
NETAPP DATAFORT
NetApp DataFort systems combine secure access controls,
authentication, storage hardware–based encryption, and secure
logging to protect stored data. NetApp DataFort appliances provide
protection for the following environments:
 E-Series DataFort appliances: NAS stores and iSCSI
storage
 FC-Series DataFort appliances: FC SAN and tape storage
mediums
 S-Series DataFort appliances: SCSI tape environments
NetApp DataFort storage security appliances enable
enterprises to secure networked storage by locking down stored
data with strong encryption and by routing access for all secured
data through secure hardware. The appliances are designed to
maximize security without affecting network performance or user
workflows. As a result, storage administrators can confidently and
quickly encrypt all sensitive data,
Figure 1) NetApp DataFort storage encryption
With NetApp DataFort appliances, storage and security
administrators have the ability to:
 Compartmentalize data in centralized storage devices to
provide an additional layer of protection for secure data.
 Encrypt and secure data on storage devices and in transit.
 Protect backup media, mirrored servers, and disaster
recovery sites.
 Comply with security and privacy regulations.
 Protect sensitive stored data from unauthorized access with
secure access controls, authentication, storage encryptions,
and secure logging.
 Generate customizable logs to track relevant events to record
a history of administrative actions and identify who is trying
to intrude into the network.
 Fend off security breaches by using AES 256-bit encryption
and a true random number generator to create strong keys
that never leave the secure hardware of NetApp DataFort.
Figure 2) NetApp DataFort customer example.
All NetApp security appliances support creation of
administrators with granular, customizable roles. Each
administrator role is allowed only a subset of duties, so that
responsibilities are distributed among multiple individuals.
NetApp DataFort is flexible enough to allow creation of custom
administrator roles by combining multiple roles into an
administrator that suits a company’s unique needs. To provide an
irrefutable audit trail for encrypted data access and administrator
activity, secure audit logging is available for all NetApp storage
security appliances. Each log message can be cryptographically
signed. Attempts to modify the signature or the logs themselves
can be easily verified for integrity and authenticity.
BROCADE ENCRYPTION
NetApp and Brocade have developed a joint fabric-based
data encryption approach that delivers nondisruptive encryption
and provides a centralized point of management for storage
security and key management. The joint solution helps to enable a
whole new level of encryption performance by giving customers
the ability to quickly and easily encrypt corporate data for
increased security and compliance with simplified policy
management. Additionally, the incorporation of NetApp
technology enables NetApp customers to operate the Brocade
Encryption Switch in NetApp DataFort compatibility mode,
serving as a next-generation NetApp DataFort security appliance.
The joint encryption solutions are available on the Brocade
Encryption Switch, a high-performance, 32-port, auto-sensing
8Gbit/sec Fiber Channel switch, and the Brocade FS8-18
Encryption Blade, which provides the same plug-in storage
security services in a 16-port blade for use in the Brocade DCX
Backbone.
Benefits of the joint NetApp and Brocade solution include
 No performance impact: Users realize unparalleled
encryption processing speeds (up to 96Gbit/sec), which
means that they can encrypt without the traditional
performance penalty.
 Ease of installation: The solution plugs in to networks that
support all heterogeneous servers (including virtual
machines) in data center fabrics. Implementation is easy,
with nonintrusive deployment into the SAN switching
fabric.
 Strong, centralized key management: Protects against
electronic and physical attacks. Customers can deploy
maximum security through tamper-proof hardware
enclosures, key signing, role-based administration, and
quorum control with the NetApp Lifetime Key
Management™ solution.
 Enterprise-class scalability: IT can scale storage
enterprise-wide and on demand, enabling ―pay as you
grow‖ for quick implementation of data security.
 Minimized operating costs: Low power requirements
minimize operating costs as enterprises scale up, lowering
the total cost of ownership necessary to encrypt massive
amounts of data.
VII. CONCLUSION
Networked storage speeds access to information—but it
can also leave data vulnerable. Firewalls and intrusion-prevention
systems can secure assets at the perimeter, but data at the storage
core can still be exposed to both internal and external attacks. IT
organizations are working hard to ensure the security of the
company’s valuable data assets, complying with regulatory
mandates, meeting industry standards for data confidentiality, and
ensuring data security from any and all threats. Enterprises that
effectively protect key data experience many benefits, including
increased customer trust, reduced losses due to fraud or theft, and
the ability to comply with industry regulations. NetApp and
Brocade provide industry-leading storage encryption and key
management capabilities that enable enterprises to achieve security
throughout the entire lifecycle of regulated and sensitive data—
without disrupting applications, clients, servers,or user workflow.
VIII. ACKNOWLEDGEMENT
I am extremely thankful to my guide Mr. Thyagaraja
Murthy A, Associate Professor, Dept. of ECE, SJCE, Mysuru for
their valuable guidance, constant assistance, support, endurance
and constructive suggestions for the completion of this work.
ISBN-13: 978-1537033419
www.iaetsd.in
Proceedings of ICDER-2016
©IAETSD 201636

iaetsd Using encryption to increase the security of network storage

  • 1.
    Using Encryption toIncrease the Security of Network Storage Mahesh M N M.Tech Student (Network and Internet Engineering) Department of Electronics and Communication Engineering Sri Jayachamarajendra College of Engineering Mysuru, India Mahesh2789mn@gmail.com Abstract- IT managers are working hard to ensure the security and integrity of key organization’s data. Corruption of data can occur due to purposeful attack from many sources, including black hat hackers, terrorists, company competitors, and disgruntled employees. Data can also be compromised by accident, by careless or poorly trained employees. Whether malicious or accidental, the consequences of a threat exploiting vulnerability can be devastating to the enterprise. Inadequate security can result in the disclosure of confidential data to unauthorized recipients, loss of integrity due to damaged or deleted data, and loss of access to the data I. INTRODUCTION To reduce the risks of exposing or damaging company data, IT managers must evaluate all of their data storage security processes. Organizations that are effectively protecting their data obtain many benefits, including increased customer trust; reduced losses due to fraud or theft; maintaining privacy and integrity of data while at rest or in flight; and the ability to achieve compliance with industry regulations. Storage encryption is one of the core features of a storage security strategy that is rapidly gaining popularity with enterprises that process and store data. Storage encryption solutions use encryption technologies to secure data whether it is online, backed up, or archived, both in transit (data n flight) and on the storage medium (data at rest). Storage encryption enables enterprises to cost effectively protect the confidentiality of data stored in their storage infrastructure networks. By encrypting stored data, enterprises gain the ability to protect the company’s private data from accidental or malicious intruders, reduce capital expenditures, and achieve savings in data transport costs. II. THE NEED TO ENCRYPT STORAGE DATA The advantages of networked data storage technologies such as network-attached storage (NAS) and storage area networks (SAN) are well established, but having data on a network creates significant security risks. Data that resides in a networked storage environment can be much more vulnerable to unauthorized access, theft, and misuse than data stored in direct-attached storage (DAS) appliances. This is because aggregated storage in a SAN is not designed to compartmentalize the data it contains. As a result of pooling storage, data that originated in different applications or company divisions becomes comingled when stored in the network. Data backups, off-site mirroring, and other data replication techniques further increase the risk of unauthorized access to data from people both inside and outside the company firewall. With storage networks, a single security breach can threaten much larger data repositories than isolated storage systems. Curious or malicious insiders, administrators, partners, hackers, contractors, and outsourced service providers can all gain access to data quite easily. IT managers are seeking storage infrastructure solutions that will help them minimize risks and achieve the following goals. Thyagaraja Murthy A Associate Professor Department of Electronics and Communication Engineering Sri Jayachamarajendra College of Engineering Mysuru, India trmsjce@gmail.com  Achieving internal and external compliance:  Complying with external entities and laws, such as PCI, SEC, GLBA, HIPAA,,and SOX  Maintaining internal security policies and access controls  Minimizing the risk of unauthorized access  Securing intellectual property:  Maintaining competitive advantage by securing the most important business assets  Protecting key data from internal and external attacks  Reducing TCO:  Achieving quick, easy,plug-in deployment  Minimizing costly changes to storage infrastructure  Securing data at rest and data in flight Current technologies—such as firewalls, Intrusion Prevention Systems (IPSs), and Virtual Private Networks (VPNs)—seek to secure data assets by protecting the perimeter of the network. LUN masking and zoning in SAN environments also attempt to address concerns about security. Unfortunately, these targeted approaches cannot adequately secure storage if data is still stored in clear text (that is, data that is transferred or stored without cryptographic protection). Encrypting data at rest on tape and disk as well as data in transit significantly mitigates these threats and enables enterprises to secure data while maintaining current service levels for operations. III. THREAT MODEL FOR DATA AT REST AND DATA IN FLIGHT Over the lifespan of data, nearly all media eventually leave the owner’s control, either when it is decommissioned at its end of life or end of lease or is returned for warranty or repair. Loss of physical control of storage media includes all media types, such as removable media such as tape cartridges, disk drives in servers, and networked storage drives. Even if the media is decommissioned due to end-of-life or system failure, the data on that media may still be readable. For example, data on the vast majority of failed hard drives can still be read; even drives that were part of a striped array are also at risk. Disk striping divides a body of data into blocks and spreads the data blocks across several partitions on several hard disks, but in a failure, some data remains. The typical stripe size in today’s arrays is large enough to expose hundreds of customer names and social security numbers. Some companies require data cleansing before recycling all storage media. However, these methods do not guarantee the elimination of the data. These security processes can be ineffective if human beings misplace or skip any media that need to be sanitized before recycling. Even if all media are cleansed, overwriting media can take hours or days, may miss reallocated portions of the media, or may not work at all under certain failure conditions. There is also no indication of when the processes are complete. It is clear that most methods of data cleansing are imperfect. These issues and ISBN-13: 978-1537033419 www.iaetsd.in Proceedings of ICDER-2016 ©IAETSD 201633
  • 2.
    the increasing risksof data exposure have rapidly accelerated the widespread interest in encryption. Encryption can automatically secure the data when the media leave the owner’s control—without dependence on humans and costly, time-consuming, and imperfect processes. IV. CHOOSING AN ENCRYPTIONSOLUTION One of the most effective methods of protecting the privacy of data is to encrypt it. Encryption is the process of converting readable clear text into unreadable cipher text, which can later be decrypted back into the original content. Encryption technologies can be used to protect an organization's SAN, NAS, tape, and iSCSI data stores. Storage security technology is based on an array of encryption algorithms. However, all encryption algorithms have finite periods of usability. As the existing encryption algorithms age and processor power increases, today’s algorithms become progressively more vulnerable to breaking. Earlier encryption algorithms such as DES and 3DES, and hashing algorithms such as MD5 and SHA-1, are now considered to be insecure. Effective encryption solutions should take advantage of the strongest commercially available algorithms such as AES. It is also important to consider the complete security of a system—encryption is only as strong as its weakest link. If data is encrypted using AES-256, but keys are stored in clear text and left in an open operating system, it is fairly easy to compromise the entire system. Because of the changing nature of encryption standards, it is also important that the encryption solution can be upgraded to address emerging standards without requiring full hardware replacement.  No performance impact: The solution should be able to compress and encrypt data at wire speeds without a requirement for additional CPU overhead.  Ease of Installation: An effective solution should deploy seamlessly into the current IT environment. Installation should require zero downtime and not cause any disruption to workflow. It should not require any modifications to the hosts, servers, and applications, and it should not necessitate forklift upgrades to storage.  Strong Key Management: The solution should provide secure encryption keys and maximize availability when needed.  Scalability: As the amount of data grows, the solution should scale cost effectively. When selecting an encryption solution, it is also important to make sure that the solution has gone through formal, independent certification. The standard certification body for encryption technologies is the National Institute of Standards and Technology (NIST), which tests and certifies third-party products against a standard called the Federal Information Processing Standard (FIPS). Other certifications, most notably the international Common Criteria standard, are also used to validate that encryption products have been built properly. Without independent validation, it is difficult to be sure that the products perform as promised. V. WHERE AND HOW TO IMPLEMENT ENCRYPTION There are several choices for where and how to implement encryption. Each method imposes some trade-offs for performance, complexity, and ease of use. The following sections examine the pros and cons of each method. ENCRYPTION IN THE APPLICATIONOR DATABASE: If it is possible to identify specific data that must be protected, it may be possible to encrypt just the sensitive or valuable data. For example, a database application could enable encryption at the column level. The advantage of this type of approach is that the amount of data being encrypted is minimized so that the performance impact on the application is potentially minimized. The challenges of this type of approach include the ability to properly identify all fields that contain sensitive or regulated data and ensuring that any changes to the application or schema take into account whether they should be encrypted. Because application encryption is specific to a given application, if multiple applications require access to encrypted data it is difficult, if not impossible, to find compatible solutions that use a common key management infrastructure. Further, it is likely that one or more of the applications will not natively support its own encryption mechanism. ENCRYPTION IN THE FILE SYSTEM OR OPERATING SYSTEM Several operating systems provide options for either turning on encryption in the native file system or adding an encryption facility on top of the native file system. Traditionally, additional software may be installed on a server that enables the user to encrypt and decrypt individual files. Performing selective encryption may reduce the impact on performance. In addition, as host processors in devices like laptops became more powerful, full disk and full file system encryption have been introduced. The advantage of using selective encryption by file is that it can reduce the performance impact. However, users may have to be involved in performing the encryption and decryption as an extra step. By encrypting all files, users may not see the encryption and decryption steps, but there is likely to be a performance impact. Performing encryption in the servers provides the ability to provision encryption processing where it’s needed. The downside is that it will probably be intrusive to the operations of that server. If encryption is done in software, performance on that server is significantly affected whenever a nontrivial amount of data must be encrypted. It may be possible for encryption is to be done in specialized hardware added to these hosts, but there will be downtime for each server to be shut down, have the coprocessor installed, reboot, install the driver software (and perhaps reboot again), test the applications, and bring it back on line. In large enterprises with tens, hundreds, or thousands of servers, this could be extremely invasive to operations. Further, because this deployment does not happen instantaneously, IT must plan the rollout very carefully. There will be periods when some servers are encrypting data and others are unable to access it. Finally, it is important to find a solution that supports allthe host configurations (both hardware and OS) that the enterprise uses today and will use in the future. ENCRYPTION IN THE DEVICE DRIVER OR NETWORK INTERFACE: Data can be encrypted in the network interface, such as a host bus adapter or network interface card. Some network cards include dedicated hardware logic for accelerating the cryptographic functions. The information is protected from the server through the SAN to the storage. Currently, this type of solution tends to focus on data in flight versus data at rest, where there is a possibility of capturing data in flight and performing an analysis to find the keys and access the data. Temporary keys are used and periodically updated. When solutions focus on data at rest, encryption keys protect data for much longer periods of time. This requires that the length of the key and strength of encryption are sized appropriately and that key management includes the ability to maintain keys for long periods of time . CENTRALIZED ENCRYPTION ON THE NETWORK: Network-based encryption offers the benefits of centralized encryption and key management and enabling encryption on existing storage devices. The centralized approach to encryption in the network uses one key vault and management application to encrypt data for multiple types of heterogeneous storage (disk and tape). Instead of buying several devices that enable encryption for a given application, network-based solutions encrypt data for multiple applications and use the same user interface to manage encryption policies. Network-based implementations enable encryption from a centralized location to existing storage devices. Without upgrading end devices, network-based encryption can selectively encrypt data to meet the needs of the organization. For SAN-based disk-based encryption, the user can configure encryption at the logical unit (LUN) level so that only specific application data is encrypted on large storage arrays. In NAS-based encryption of online data on disk, the encryption is ISBN-13: 978-1537033419 www.iaetsd.in Proceedings of ICDER-2016 ©IAETSD 201634
  • 3.
    done at thenetwork-share level. For tape-based encryption, data encryption keys can be associated to individual tapes or tape pools to refine the granularity of encryption. Although some initial deployments added significant latency to the encryption process, the latest generation of solutions adds a minimalamount of delay to ensure that backup windows are maintained in tape applications. With network-based encryption, users have the flexibility and power to encrypt data on legacy storage devices and to encrypt only the data than needs to be encrypted. ENCRYPTION IN THE STORAGE DEVICE: Self-encrypting storage devices embed encryption in the storage device itself, providing full disk encryption so that fine-grained data classification is not needed and the device can leave the owner’s control securely. Neither the encryption key nor the encrypted text ever leave the device, enhancing security, greatly simplifying key management, and making the encryption transparent to the OS, databases, and applications. Because the encryption key does not leave the device, there is no need to track or manage the encryption keys. Cryptographic processing within the device can potentially have no measurable performance impact on the system, and it allows the encryption to scale linearly automatically as more storage is added to the system. All data can be encrypted, with no performance degradation, so there is no need to classify which data to encrypt. It’s easy to quickly and securely erase the entire device by erasing the encryption key in the device, without worry that there may be a copy of that encryption key somewhere outside the device. The key has never left the device and there is no other copy, so the proof of data destruction is the execution of that single process. The need to re encrypt data is minimized because the encryption key doesn’t need to be changed when an administrator leaves the job. Encrypting in the device may add cost to that device, and the implementation schedule may affect the natural replacement schedule of storage devices. However, this impact may be offset by the fact that it is being implemented in standard storage devices and cuts device decommissioning costs and headaches. DECIDING WHICH ENCRYPTION METHODTO USE: Each method of encryption has its advantages and disadvantages. The following table can help decide which approach is the best choice for a given deployment: A. Database or Application Considerations:  Is all sensitive data in one or two columns in a database?  Will application performances be affected? Advantages:  Minimal performance impact on the application. Challenges:  Must identify all fields with sensitive or regulated data.  Need to ensure that all changes to application or schema include whether they should be encrypted.  Difficult to find compatible solutions that use a common key management infrastructure.  Some applications may not natively support their own encryption mechanism. B. File System or Operating System Considerations:  Will it be uniform across all environments and operating systems?  Will performance be affected or disrupted? Advantages:  Provides the ability to provision encryption processing where it is needed.  May allow selective encryption. Challenges:  Users may have to be involved in invoking the encryption and decryption as an extra step.  If encryption is done in software, performance on that server is significantly affected whenever a nontrivial amount of data needs to be encrypted.  Solution must support all host configurations (both hardware and OS) that the enterprise uses today and will use in the future.  May affect performance. C. Device Driver or Network Interface: Considerations:  Will scalability be an issue as data grows?  Is port connectivity, rack space,or power an issue? Advantages:  Information is protected from the server through the SAN to the storage. Challenges:  Current solutions tend to focus on data in flight versus data at rest where there is a possibility of capturing data in flight and performing an analysis to find the keys and access the data. D. Network Considerations:  Will interoperability with other SAN devices be an issue?  How many storage devices need to be protected? Advantages:  Enables encryption on existing storage devices  Can selectively encrypt only the data than needs to be encrypted. Challenges:  Some early solutions added latency to the encryption process, but newer solutions add less than a millisecond of delay to ensure that backup windows are maintained in tape applications. E. Storage Devices Considerations:  Will encryption work across all vendor storage (that is, heterogeneous) environments?  What kind of key management will be used? Advantages:  Provides full disk encryption.  The device can leave the owner’s control securely.  Simplifies key management.  No significant performance impact to the system.  Allows encryption to scale linearly automatically as more storage is added to the system.  No need to classify which data to encrypt. Challenges:  May not work across all vendor storage environments.  May add cost to the device.  Requires forklift upgrade of existing storage devices. VI. NETAPP ENCRYPTION SOLUTIONS Enterprises can now secure sensitive data across the entire organization and manage stored data through NetApp’s enterprise-wide foundation of control. NetApp storage security systems deliver nondisruptive, comprehensive protection for sensitive data across the enterprise, for both data at rest and data in flight. NetApp storage solutions enable enterprises to protect intellectual property and confidential information, more easily comply with industry and government regulations, and preserve company reputation by avoiding publicized loss of data. ISBN-13: 978-1537033419 www.iaetsd.in Proceedings of ICDER-2016 ©IAETSD 201635
  • 4.
    NETAPP DATAFORT NetApp DataFortsystems combine secure access controls, authentication, storage hardware–based encryption, and secure logging to protect stored data. NetApp DataFort appliances provide protection for the following environments:  E-Series DataFort appliances: NAS stores and iSCSI storage  FC-Series DataFort appliances: FC SAN and tape storage mediums  S-Series DataFort appliances: SCSI tape environments NetApp DataFort storage security appliances enable enterprises to secure networked storage by locking down stored data with strong encryption and by routing access for all secured data through secure hardware. The appliances are designed to maximize security without affecting network performance or user workflows. As a result, storage administrators can confidently and quickly encrypt all sensitive data, Figure 1) NetApp DataFort storage encryption With NetApp DataFort appliances, storage and security administrators have the ability to:  Compartmentalize data in centralized storage devices to provide an additional layer of protection for secure data.  Encrypt and secure data on storage devices and in transit.  Protect backup media, mirrored servers, and disaster recovery sites.  Comply with security and privacy regulations.  Protect sensitive stored data from unauthorized access with secure access controls, authentication, storage encryptions, and secure logging.  Generate customizable logs to track relevant events to record a history of administrative actions and identify who is trying to intrude into the network.  Fend off security breaches by using AES 256-bit encryption and a true random number generator to create strong keys that never leave the secure hardware of NetApp DataFort. Figure 2) NetApp DataFort customer example. All NetApp security appliances support creation of administrators with granular, customizable roles. Each administrator role is allowed only a subset of duties, so that responsibilities are distributed among multiple individuals. NetApp DataFort is flexible enough to allow creation of custom administrator roles by combining multiple roles into an administrator that suits a company’s unique needs. To provide an irrefutable audit trail for encrypted data access and administrator activity, secure audit logging is available for all NetApp storage security appliances. Each log message can be cryptographically signed. Attempts to modify the signature or the logs themselves can be easily verified for integrity and authenticity. BROCADE ENCRYPTION NetApp and Brocade have developed a joint fabric-based data encryption approach that delivers nondisruptive encryption and provides a centralized point of management for storage security and key management. The joint solution helps to enable a whole new level of encryption performance by giving customers the ability to quickly and easily encrypt corporate data for increased security and compliance with simplified policy management. Additionally, the incorporation of NetApp technology enables NetApp customers to operate the Brocade Encryption Switch in NetApp DataFort compatibility mode, serving as a next-generation NetApp DataFort security appliance. The joint encryption solutions are available on the Brocade Encryption Switch, a high-performance, 32-port, auto-sensing 8Gbit/sec Fiber Channel switch, and the Brocade FS8-18 Encryption Blade, which provides the same plug-in storage security services in a 16-port blade for use in the Brocade DCX Backbone. Benefits of the joint NetApp and Brocade solution include  No performance impact: Users realize unparalleled encryption processing speeds (up to 96Gbit/sec), which means that they can encrypt without the traditional performance penalty.  Ease of installation: The solution plugs in to networks that support all heterogeneous servers (including virtual machines) in data center fabrics. Implementation is easy, with nonintrusive deployment into the SAN switching fabric.  Strong, centralized key management: Protects against electronic and physical attacks. Customers can deploy maximum security through tamper-proof hardware enclosures, key signing, role-based administration, and quorum control with the NetApp Lifetime Key Management™ solution.  Enterprise-class scalability: IT can scale storage enterprise-wide and on demand, enabling ―pay as you grow‖ for quick implementation of data security.  Minimized operating costs: Low power requirements minimize operating costs as enterprises scale up, lowering the total cost of ownership necessary to encrypt massive amounts of data. VII. CONCLUSION Networked storage speeds access to information—but it can also leave data vulnerable. Firewalls and intrusion-prevention systems can secure assets at the perimeter, but data at the storage core can still be exposed to both internal and external attacks. IT organizations are working hard to ensure the security of the company’s valuable data assets, complying with regulatory mandates, meeting industry standards for data confidentiality, and ensuring data security from any and all threats. Enterprises that effectively protect key data experience many benefits, including increased customer trust, reduced losses due to fraud or theft, and the ability to comply with industry regulations. NetApp and Brocade provide industry-leading storage encryption and key management capabilities that enable enterprises to achieve security throughout the entire lifecycle of regulated and sensitive data— without disrupting applications, clients, servers,or user workflow. VIII. ACKNOWLEDGEMENT I am extremely thankful to my guide Mr. Thyagaraja Murthy A, Associate Professor, Dept. of ECE, SJCE, Mysuru for their valuable guidance, constant assistance, support, endurance and constructive suggestions for the completion of this work. ISBN-13: 978-1537033419 www.iaetsd.in Proceedings of ICDER-2016 ©IAETSD 201636