improve energy efficiency of secure disk systems - nas09
DESCRIPTION
Improving energy efficiency of security-aware storage systems is challenging, because security and energy efficiency are often two conflicting goals. The first step toward making the best tradeoffs between high security and energy efficiency is to profile encryption algorithms to decide if storage systems would be able to produce energy savings for security mechanisms. We are focused on encryption algorithms rather than other types of security services, because encryption algorithms are usually computation-intensive. In this study, we used the XySSL libraries and profiled operations of several test problems using Conky - a lightweight system monitor that is highly configurable. Using our profiling techniques we concluded that although 3DES is much slower than AES encryption,it more likely to save energy in security-aware storage systems using 3DES than AES. The CPU is the bottleneck in 3DES, allowing us to take advantage of dynamic power management schemes to conserve energy at the disk level.After profiling several hash functions, we noticed that the CPU is not the bottleneck for any of these functions,indicating that it is difficult to leverage the dynamic power management technique to conserve energy of a single disk where hash functions are implemented for integrity checking.TRANSCRIPT
![Page 1: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/1.jpg)
Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security
Mechanisms?
Xiaojun Ruan, Adam Manzanares, Shu Yin and Xiao Qin
Auburn Universityhttp://www.eng.auburn.edu/~xqin
![Page 2: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/2.jpg)
2 04/08/23
IntroductionIntroduction
![Page 3: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/3.jpg)
04/08/23
IntroductionIntroduction
![Page 4: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/4.jpg)
404/08/23
IntroductionIntroduction
![Page 5: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/5.jpg)
Proposed Architecture
• Write requestsWrite requests • Read requestsRead requests • Data movementData movement • Power Power
ManagementManagement
Disk 1 Disk 2 Disk 3 Disk 4 Disk 5
Buffer Disks
RAM BufferRAM Buffer Buffer Disk Controller
Buffer Disk ControllerDisk RequestsDisk Requests
![Page 6: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/6.jpg)
Security vs. Power Consumption
ACM Transactions on Information and System Security, Vol. 9, No. 2, May 2006.
R. CHANDRAMOULI et. al
![Page 7: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/7.jpg)
Improve both Energy Efficiency and Security: Approach 1
• To improve the energy efficiency of security To improve the energy efficiency of security mechanisms in disk systems mechanisms in disk systems
Security Mechanisms
Improve Energy
Efficiency
![Page 8: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/8.jpg)
Improve both Energy Efficiency and Security: Approach 2
• To integrate conventional security services To integrate conventional security services with energy-efficient disk architectures.with energy-efficient disk architectures.
Security Mechanisms
Energy Conservation Schemes
![Page 9: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/9.jpg)
Table 1 System Parameters of the Testbed
CPU SpeedPentium 4 2.4 GHZ
Memory 512 MB
Operating System Ubuntu 7.10
USB 1.1 12 Mb/s
HD Bus IDE
![Page 10: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/10.jpg)
XysslXyssl
• Implements many popular encryption Implements many popular encryption algorithmsalgorithms
• Provides sample programsProvides sample programs• Allowed us to develop software based Allowed us to develop software based
on the sample programson the sample programs
![Page 11: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/11.jpg)
ConkyConky
• Lightweight system monitorLightweight system monitor• Highly configurableHighly configurable• Simple text configuration fileSimple text configuration file
![Page 12: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/12.jpg)
ConkyConky
![Page 13: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/13.jpg)
Testbed InformationTestbed Information
• Encryption AlgorithmsEncryption Algorithms• 3DES3DES• AESAES
• Hash FunctionsHash Functions• MD5MD5• SHA-1SHA-1• SHA-256SHA-256
• RSA Signature VerificationRSA Signature Verification
![Page 14: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/14.jpg)
Possible BottlenecksPossible Bottlenecks
Receive
Encrypt or Verify
Store
Flash Drive (Network)
CPU
Hard Disk
![Page 15: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/15.jpg)
Experiment ResultsExperiment Results
• MD5 VerificationMD5 Verification
![Page 16: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/16.jpg)
Experiment ResultsExperiment Results
• MD5 VerificationMD5 Verification
![Page 17: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/17.jpg)
Experiment ResultsExperiment Results
• SHA-1 VerificationSHA-1 Verification
![Page 18: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/18.jpg)
Experiment ResultsExperiment Results
• SHA-1 VerificationSHA-1 Verification
![Page 19: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/19.jpg)
Experiment ResultsExperiment Results
• RSA VerificationRSA Verification
![Page 20: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/20.jpg)
Experiment ResultsExperiment Results
• RSA VerificationRSA Verification
![Page 21: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/21.jpg)
Experiment ResultsExperiment Results
• Advanced Encryption StandardAdvanced Encryption Standard
![Page 22: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/22.jpg)
Experiment ResultsExperiment Results
• Advanced Encryption StandardAdvanced Encryption Standard
![Page 23: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/23.jpg)
Experiment ResultsExperiment Results
• 3DES3DES
![Page 24: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/24.jpg)
Experiment ResultsExperiment Results
• 3DES3DES
![Page 25: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/25.jpg)
A Sample Table
CPULoad
ReadLoad
WriteLoad
Save Energy for Reads?
Save Energy for Writes?
MD5 M H M Unlikely Yes
SHA1 M VH M Unlikely Yes
SHA2 M VH M Unlikely Yes
RSA M VH M No Yes
AES VH VH M No Yes
3DES EH M L Yes Yes
![Page 26: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/26.jpg)
ConclusionConclusion• For MD5, SHA-1, SHA-2 and RSA, the For MD5, SHA-1, SHA-2 and RSA, the
bottleneck is the reading speed due to the bottleneck is the reading speed due to the network data transmitting rate.network data transmitting rate.
• For 3DES, bottleneck is CPU, because For 3DES, bottleneck is CPU, because 3DES algorithm’s workload is very high.3DES algorithm’s workload is very high.
• There is no space to save energy for There is no space to save energy for Bottleneck components Bottleneck components
![Page 27: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/27.jpg)
Major drawbacks of this researchMajor drawbacks of this research• Workload was not representativeWorkload was not representative
• Dedicated I/O workload.Dedicated I/O workload.• Did not consider access patterns of a single Did not consider access patterns of a single
user / multiple usersuser / multiple users
• Test bed was not representative Test bed was not representative • An emulated network environment.An emulated network environment.• Only evaluated a single disk rather than parallel Only evaluated a single disk rather than parallel
disksdisks
![Page 28: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/28.jpg)
Download the presentation slideshttp://www.slideshare.net/xqin74
Google: slideshare Xiao Qin
![Page 29: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/29.jpg)
Download our paper
Google: Xiao Qin
X.-J. Ruan, A. Manzanares, S. Yin, M. Nijim, and X. Qin, “Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?” Proc. 4th IEEE Int'l Conf. Networking, Architecture, and Storage, July 2009.
http://www.eng.auburn.edu/~xqin/pubs/nas09.pdf
Abstract: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5197358
![Page 30: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.us/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/30.jpg)
QuestionsQuestions
??