The present invention relates to a method for maintenance or exchange of an encryption function in a storage system using a key management server, in particular, to a method for acquiring key information upon maintenance or exchange of a controller.
A technology exists for encrypting data with an encryption key in an HDD (Hard Disk Drive) inside a storage device of a storage system to improve security (Patent Literature 1). A technology also exists for encrypting data, and upon storing the data over a long period of time, exchanging stored encrypted data on the basis of a new set of encryption standards (Patent Literature 2). Further, a technology exists for generating and managing an encryption key using a key management server different from a storage device in order to improve security in consideration of theft of an HDD or the like (Patent Literature 3).
In the case where the encryption key is generated and managed using the key management server different from the storage device as disclosed in Patent Literature 3, the storage device per se does not generate the key. Therefore, in the case where maintenance or exchange of a controller is performed when a fault is caused in the controller in the storage device, a newly exchanged controller or a spare controller does not have an encryption key, and therefore necessity of deriving a key from the key management server (KMS server) is caused. Thus, a method can be considered for acquiring key information from an exchanged controller by LAN communication to the key management server. However, the key information is acquired after the exchanged controller comes into a ready state, and therefore a problem of taking time for starting up of the exchanged controller is produced.
PTL 1: JP-A-2005-109641.
PTL 2: JP-A-2005-303981.
PTL 3: JP-A-2010-277427.
In general, in the case where maintenance or exchange of a controller (CTL) is executed in a storage system in which a function of encrypting stored data is used, maintenance or exchange is conventionally performed by procedures as described below. More specifically, according to a configuration in which a controller (CTL0) before exchange to which I/O module A (a module performing I/O processing on a back-end side) is connected to a KMS server by LAN communication A, and an exchanged controller (CTL1) to which I/O module B is connected to the KMS server by LAN communication B, the following procedures are required in order to complete starting up of CTL1:
(1) Securing LAN communication;
(2) Acquiring key information by demanding the information from the KMS server;
(3) Acquiring the key information to start up I/O module B (the key information is required for starting up the I/O module); and
(4) Starting up I/O module B to convert CTL1 into a ready state.
In (1) described above, LAN communication B cannot perform communication with the KMS server in Patent Literature 3. When an encryption function is not used for stored data, the I/O module can be started up from information in a Flash memory in the controller. However, when the encryption function is used for the stored data, the communication with the KMS server is not ready, and therefore a function for encryption communication cannot be used from the information in the Flash memory. Therefore, the key information cannot be demanded from the KMS server, and thus starting up of CTL cannot be made. Even if an information area of the Flash memory is extended to allow correspondence to the function for encryption communication, a period of time needed from initial start-up to establishment of LAN communication is long, and time is required to reach a Ready state (a state in which I/O can be processed between a host computer and a disk).
Controllers in a storage system to which the present invention is applied has a dual configuration, and one is a new controller or a spare controller to be maintained or exchanged, and the other is a controller in a Ready state, and holds key information.
Consequently, according to the present invention, in order to solve the problems described above, the controller (CTL0) in the Ready state spoofs a controller (CTL1) subjected to maintenance or exchange, acquires key information from a key management server, and transfers the information to the controller subjected to maintenance or exchange and to convert the controller into the Ready state. In addition, CEK (Contents Encryption Key)/DEK (Data Encryption Key) being the key information is inherent to each controller.
In the present invention, action of “spoof” as described above is performed as described below.
CTL0 uses information on authentication and identification of CTL1, accesses the key management server (KMS server), and acquires the key information. Next, CTL0 stores the key information of CTL1 as acquired from the KMS server in a Flash memory and a Cache memory. Finally, CTL1 reads the key information from the Flash memory and the Cache memory of CTL0, and writes the information in an own Flash memory and an own Cache memory.
Further, CTL0 deletes the key information of CTL1 that remains in the own Flash memory and the own Cache memory.
According to the present invention, a controller in a Ready state spoofs a controller subjected to maintenance or exchange upon maintenance or exchange of an encryption function in a storage system, and acquires key information, and therefore the controller subjected to maintenance or exchange can be quickly started up.
(System Configuration)
A configuration of a storage system in the present Example is shown in
In disk array device 1, two lines of controllers, namely, CTL0 (7) and CTL1 (8) are arranged for HDD (Hard Disk Drive) 9 that configures a disk array constituted of a plurality of disks 17a to 17c for storing encrypted data, and the controllers 7 and 8 are connected with HDD 9 by B/E I/O modules 15a and 15b each being a back-end module, respectively. B/E I/O modules 15a and 15b have an encryption communication device being hardware for controlling transfer of encrypted data between each of controllers 7 and 8 and HDD 9, and a DEK (Data Encryption Key) list required for data encryption or decryption. Moreover, the controllers 7 and 8 are connected to SAN 5 through host I/O modules 10a and 10b, respectively, and connected to LAN 6 through LAN ports 11a and 11b, respectively.
Controller CTL0 (7) has memory 18a, and D-CTL 12a being a microprogram in memory 18a, and D-CTL 12a has an encryption function for encrypting or decrypting data, and simultaneously confirms whether HDD 17 performing I/O is RG (RAID Group) or DP (Dynamic Provisioning) Pool for designating encryption. To memory 18a having D-CTL 12a, CPU 13a and Cache memory 14a are connected, and memory 18a is further connected to host I/O module 10a and LAN port 11a, and B/E I/O module 15a. D-CTL 12a in memory 18a is executed by CPU 13a. Controller CTL1 (8) also has a similar configuration. Two lines of controllers CTL0 (7) and CTL1 (8) are connected by control line 16 for mutual information exchange or the like.
One of two lines of controllers CTL0 (7) and CTL1 (8) is a new controller to be maintained or exchanged, or a spare controller, and the other holds the key information and is in a Ready state (a state in which I/O can be processed between a host computer and a disk). Consequently, according to the present Example, controller 7 (CTL0) in the Ready state spoofs controller 8 (CTL1) subjected to maintenance or exchange, acquires the key information from the key management server (KMS 4), transfers the information to controller 8 subjected to maintenance or exchange, and converts controller 8 subjected to maintenance or exchange into the Ready state. As a result, maintenance or exchange from controller 7 to controller 8 is completed. The key information acquired by the controller from the key management server (KMS 4) is stored in memory 18a. In addition, when a controller deletes the key information, the controller is in a Halt state (a state in which I/O control is not performed or cannot be performed).
(Processing Flow)
The outline of maintenance or exchange processing of a controller in the present Example is described using
(1) CTL0 performing control of transceiving data between host computer 2 and HDD 9 monitors to detect existence of CTL1 for maintenance or exchange in disk array device 1 (301).
(2) CTL0 accesses a key management server (KMS 4) to acquire key information (302). Methods for acquiring a key have two patterns. Pattern 1: CTL0 per se recognizes that CTL1 is inserted, and instructs SNM 3 to acquire key information from CTL0. SNM 3 accesses the key management server (KMS 4) to acquire key information. Pattern 2: On a console of SNM 3, a user issues an instruction for acquiring key information.
(3) CTL0 stores in an own Flash memory and an own Cache memory 14a the key information of CTL1 acquired from KMS 4. A notice of completing storage of the key information is transmitted from CTL0 to CTL1 through control line 16. Although the Flash memory is not shown, controllers 7 and 8 are assumed to have the Flash memory built-in. The Flash memory is used for control of controllers 7 and 8 per se, and Cache memories 14a and 14b are used for control of transceiving data between host computer 2 and HDD 9 (303).
(4) If CTL1 receives the notice of completing storage of key information from CTL0, CTL1 reads the key information from the Flash memory and the Cache memory 14a of CTL0, and writes the information in the own Flash memory and the own Cache memory 14b. As a result, CTL1 comes into a Ready state (304). A notice of completing read-out of the key information is transmitted from CTL1 to CTL0 through control line 16.
(5) Any information cannot be left in any other system from a security issue, and therefore if CTL0 receives the notice of completing read-out of the key information from CTL1, CTL0 deletes the key information of CTL0 that remains in the own Flash memory and the own Cache memory 14a (305). As a result, CTL0 comes into a Halt state. The above-described security issue refers to possibility of occurrence of status described below. More specifically, if any information remains in any other system, the information may be used, for example, for I/O between the host computer and the disk through an unauthorized access route different from an authorized access route.
Even while the above-described maintenance or exchange processing is performed, the control of transceiving data between host computer 2 and HDD 9 is performed as described below. More specifically, the control of transceiving data and above-described maintenance or exchange processing is first performed in CTL0 (CTL0 performs the control of transceiving data in behalf of CTL1 in the meantime) and CTL1 comes into the Ready state, and then the control of transceiving data is performed in CTL0 and CTL1 until the Ready state of CTL0 is canceled. As a result, the control of transceiving data is not interrupted even during maintenance or exchange processing of the controller. If a controller comes into a Halt state, the controller does not allow I/O processing between the host computer and the disk.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2013/058388 | 3/22/2013 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2014/147836 | 9/25/2014 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
8098824 | Mikami | Jan 2012 | B2 |
8259951 | Mizuno | Sep 2012 | B2 |
20050204154 | Osaki | Sep 2005 | A1 |
20070136606 | Mizuno | Jun 2007 | A1 |
20070165440 | Hirai | Jul 2007 | A1 |
20090307499 | Senda | Dec 2009 | A1 |
20100119069 | Kamikura et al. | May 2010 | A1 |
20100306555 | Sasahara et al. | Dec 2010 | A1 |
20110191595 | Damian | Aug 2011 | A1 |
20130208892 | Moriguchi | Aug 2013 | A1 |
20150271161 | Katsuta | Sep 2015 | A1 |
Number | Date | Country |
---|---|---|
2005-109641 | Apr 2005 | JP |
2005-303981 | Oct 2005 | JP |
2007-157049 | Jun 2007 | JP |
2010-277427 | Dec 2010 | JP |
0169842 | Sep 2001 | WO |
2008146395 | Dec 2008 | WO |
Entry |
---|
“Self-Encrypting Drives for Servers, NAS and SAN Arrays,” White Paper, Nov. 4, 2009, pp. 1-15. |
“Dell PowerVault™ MD32/MD36 Series of Arrays Overview of Self-Encrypting Drive Management on Dell PowerVault Storage Arrays,” White Paper, Jun. 2011, pp. 1-16. |
Kitano et al., “Open System Disk Array GR720/GR730 corresponding to the Network Computing Time” PFU. Technical Review, Nov. 1, 2000, vol. 11, No. 2, pp. 1-10. |
Number | Date | Country | |
---|---|---|---|
20160080148 A1 | Mar 2016 | US |