Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, widely used in such file systems, are known to have worse performance than their symmetric key counterparts. In this paper we examine design alternatives that avoid public-key cryptography operations to achieve better performance. We present the trade-offs and limitations that are introduced by these substitutions. Categories and Subject Descriptors D.4.6 [Operating Systems]: Security and Protection— Access controls, Authentication; E.3 [Data Encryption]: Public key cryptosystems General Terms Security Keywords secure file systems, network attached storage