on to the application node.It is a further object of the present invention to provide increased security without the need to add authentication key data structures to the disk subsystem or to the storage gateway.It is a still further object of the present invention to increase the available level of security without the necessity of changing the structure of the files, the disks, the file systems