This paper is published in Volume-3, Issue-4, 2017
Area
Networking
Author
Priyanka Khandekar, Dr. Kishor Kolhe
Org/Univ
MIT College, Pune, Maharashtra, India
Pub. Date
05 August, 2017
Paper ID
V3I4-1250
Publisher
Keywords
SAN, LVM, ISCSI Protocol, Shell Scripting, Backend Encryption.

Citationsacebook

IEEE
Priyanka Khandekar, Dr. Kishor Kolhe. An Automated Storage Area, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Priyanka Khandekar, Dr. Kishor Kolhe (2017). An Automated Storage Area. International Journal of Advance Research, Ideas and Innovations in Technology, 3(4) www.IJARIIT.com.

MLA
Priyanka Khandekar, Dr. Kishor Kolhe. "An Automated Storage Area." International Journal of Advance Research, Ideas and Innovations in Technology 3.4 (2017). www.IJARIIT.com.

Abstract

The fast growth of data intensive applications has caused a change in the traditional storage model. The server to disk approach is being replaced by storage area networks (SANS), which enable storage to be externalized from servers, thus allowing storage devices to be shared among multiple servers. The prominent technology for implementing SANs is iSCSI, due to its suitability for storage networking. The iSCSI SAN is a block-level shared-storage alternative to Fiber Channel that is becoming increasingly popular among SME organisations. One of the reasons iSCSI SANs are popular for smaller businesses that often have fewer staff members with technical expertise is because they are easy to set up and maintain compared to Fiber Channel SANs. A storage area network (SAN) is a secure high speed data transfer network that provides access to consolidated block level storage. SAN makes a network of storage devices accessible to multiple servers. SANs are sometimes also referred to SAN storage, SAN network, network SAN etc. In this paper, we proposed the automated system using this SAN technique with respect to iSCSI protocol as a storage solution by LVM sharing system and shell scripting and realized a SAN storage and encryption system, through this technology to achieve a static data encryption which realized a flexible security management strategy by multiple-key and multiple layer encryption system to project the physical resource through iSCSI’s protocol stack and virtualization techniques.