Disk-Enabled Authenticated Encryption

被引:0
|
作者
Butler, Kevin [1 ]
McLaughlin, Stephen [1 ]
McDaniel, Patrick [1 ]
机构
[1] Penn State Univ, University Pk, PA 16802 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Storage is increasingly becoming a vector for data compromise. Solutions for protecting on-disk data confidentiality and integrity to date have been limited in their effectiveness. Providing authenticated encryption, or simultaneous encryption with integrity information, is important to protect data at rest. In this paper, we propose that disks augmented with non-volatile storage (e.g., hybrid hard disks) and cryptographic processors (e.g., FDE drives) may provide a solution for authenticated encryption, storing security metadata within the drive itself to eliminate dependences on other parts of the system. We augment the DiskSim simulator with a flash simulator to evaluate the costs associated with managing operational overheads. These experiments show that proper tuning of system parameters can eliminate many of the costs associated with managing security metadata, with less than a 2% decrease in IOPS versus regular disks.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Secure Disk with Authenticated Encryption and IV Verification
    Hou, Fangyong
    Xiao, Nong
    Liu, Fang
    He, Hongjun
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 41 - 44
  • [2] Identity-based authenticated broadcast encryption and distributed authenticated encryption
    Mu, Y
    Susilo, W
    Lin, YX
    Ruan, C
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2004, PROCEEDINGS, 2004, 3321 : 169 - 181
  • [3] The Emergence of Authenticated Encryption
    Rogaway, Phillip
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479
  • [4] Indifferentiable Authenticated Encryption
    Barbosa, Manuel
    Farshim, Pooya
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 187 - 220
  • [5] Evaluating the Performance of Ascon Lightweight Authenticated Encryption for AI-Enabled IoT Devices
    Khan, Safiullah
    Lee, Wai-Kong
    Hwang, Seong Oun
    [J]. 2022 TRON SYMPOSIUM, TRONSHOW, 2022,
  • [6] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37
  • [7] Publicly verifiable authenticated encryption
    Ma, CS
    Chen, KF
    [J]. ELECTRONICS LETTERS, 2003, 39 (03) : 281 - 282
  • [8] Authenticated Encryption with Variable Stretch
    Reyhanitabar, Reza
    Vaudenay, Serge
    Vizar, Damian
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 396 - 425
  • [9] Unconditionally secure authenticated encryption
    Shikata, J
    Hanaoka, G
    Zheng, YL
    Matsumoto, T
    Imai, H
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (05): : 1119 - 1131
  • [10] WAGE: An Authenticated Encryption with a Twist
    AlTawy, Riham
    Gong, Guang
    Mandal, Kalikinkar
    Rohit, Raghvendra
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 132 - 159