METHOD AND SYSTEM FOR IMPROVING STORAGE SECURITY IN A CLOUD COMPUTING ENVIRONMENT
First Claim
1. A method of improving storage security in a cloud environment comprising:
- interfacing a secure microcontroller with a storage controller associated with a client device in the cloud environment to authenticate a platform associated with the storage controller;
registering the storage controller with an authentication server configured to be set up in the cloud environment;
authenticating the storage controller based on a communication protocol between the client device, the authentication server and the storage controller; and
obtaining, at the client device, a signature data of the storage controller following the authentication thereof, the signature data being configured to be stored in the secure microcontroller interfaced with the storage controller.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of improving storage security in a cloud environment includes interfacing a secure microcontroller with a storage controller associated with a client device in the cloud environment to authenticate a platform associated with the storage controller and registering the storage controller with an authentication server configured to be set up in the cloud environment. The method also includes authenticating the storage controller based on a communication protocol between the client device, the authentication server and the storage controller, and obtaining, at the client device, a signature data of the storage controller following the authentication thereof. The signature data is configured to be stored in the secure microcontroller interfaced with the storage controller.
97 Citations
29 Claims
-
1. A method of improving storage security in a cloud environment comprising:
-
interfacing a secure microcontroller with a storage controller associated with a client device in the cloud environment to authenticate a platform associated with the storage controller; registering the storage controller with an authentication server configured to be set up in the cloud environment; authenticating the storage controller based on a communication protocol between the client device, the authentication server and the storage controller; and obtaining, at the client device, a signature data of the storage controller following the authentication thereof, the signature data being configured to be stored in the secure microcontroller interfaced with the storage controller. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of verifying integrity of a storage controller associated with a client device in a cloud environment comprising:
-
configuring the storage controller with information associated with an authentication server set up in the cloud environment, the information being associated with a signature data of the authentication server; configuring the authentication server with a signature data associated with the storage controller; registering the storage controller with the authentication server to establish a trusted key pair therebetween; attesting the storage controller through the authentication server based on the established trusted key pair; and obtaining, at the client device, the signature data of the storage controller following the attestation thereof. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A cloud environment with improved storage security comprising:
-
a client device; a cloud manager configured to provision storage associated with the client device in the cloud environment; a storage controller associated with the client device, the storage controller comprising a secure microcontroller interfaced therewith to authenticate a platform associated therewith; and an authentication server configured to register the storage controller and to authenticate the storage controller based on a communication protocol between the client device, the storage controller and the authentication server, wherein the client device is at least one of; automatically configured to obtain a signature data of the storage controller following the authentication thereof, and configured to obtain the signature data of the storage controller following the authentication thereof upon querying the storage controller, and wherein the secure microcontroller is configured to store the signature data of the storage controller therein. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification