![Page 1: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/1.jpg)
Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security
Mechanisms?
Xiaojun Ruan, Adam Manzanares, Shu Yin and Xiao Qin
Auburn Universityhttp://www.eng.auburn.edu/~xqin
![Page 2: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/2.jpg)
2 04/08/23
IntroductionIntroduction
![Page 3: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/3.jpg)
04/08/23
IntroductionIntroduction
![Page 4: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/4.jpg)
404/08/23
IntroductionIntroduction
![Page 5: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/5.jpg)
Proposed Architecture
• Write requestsWrite requests • Read requestsRead requests • Data movementData movement • Power Power
ManagementManagement
Disk 1 Disk 2 Disk 3 Disk 4 Disk 5
Buffer Disks
RAM BufferRAM Buffer Buffer Disk Controller
Buffer Disk ControllerDisk RequestsDisk Requests
![Page 6: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/6.jpg)
Security vs. Power Consumption
ACM Transactions on Information and System Security, Vol. 9, No. 2, May 2006.
R. CHANDRAMOULI et. al
![Page 7: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/7.jpg)
Improve both Energy Efficiency and Security: Approach 1
• To improve the energy efficiency of security To improve the energy efficiency of security mechanisms in disk systems mechanisms in disk systems
Security Mechanisms
Improve Energy
Efficiency
![Page 8: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/8.jpg)
Improve both Energy Efficiency and Security: Approach 2
• To integrate conventional security services To integrate conventional security services with energy-efficient disk architectures.with energy-efficient disk architectures.
Security Mechanisms
Energy Conservation Schemes
![Page 9: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/9.jpg)
Table 1 System Parameters of the Testbed
CPU SpeedPentium 4 2.4 GHZ
Memory 512 MB
Operating System Ubuntu 7.10
USB 1.1 12 Mb/s
HD Bus IDE
![Page 10: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/10.jpg)
XysslXyssl
• Implements many popular encryption Implements many popular encryption algorithmsalgorithms
• Provides sample programsProvides sample programs• Allowed us to develop software based Allowed us to develop software based
on the sample programson the sample programs
![Page 11: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/11.jpg)
ConkyConky
• Lightweight system monitorLightweight system monitor• Highly configurableHighly configurable• Simple text configuration fileSimple text configuration file
![Page 12: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/12.jpg)
ConkyConky
![Page 13: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/13.jpg)
Testbed InformationTestbed Information
• Encryption AlgorithmsEncryption Algorithms• 3DES3DES• AESAES
• Hash FunctionsHash Functions• MD5MD5• SHA-1SHA-1• SHA-256SHA-256
• RSA Signature VerificationRSA Signature Verification
![Page 14: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/14.jpg)
Possible BottlenecksPossible Bottlenecks
Receive
Encrypt or Verify
Store
Flash Drive (Network)
CPU
Hard Disk
![Page 15: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/15.jpg)
Experiment ResultsExperiment Results
• MD5 VerificationMD5 Verification
![Page 16: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/16.jpg)
Experiment ResultsExperiment Results
• MD5 VerificationMD5 Verification
![Page 17: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/17.jpg)
Experiment ResultsExperiment Results
• SHA-1 VerificationSHA-1 Verification
![Page 18: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/18.jpg)
Experiment ResultsExperiment Results
• SHA-1 VerificationSHA-1 Verification
![Page 19: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/19.jpg)
Experiment ResultsExperiment Results
• RSA VerificationRSA Verification
![Page 20: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/20.jpg)
Experiment ResultsExperiment Results
• RSA VerificationRSA Verification
![Page 21: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/21.jpg)
Experiment ResultsExperiment Results
• Advanced Encryption StandardAdvanced Encryption Standard
![Page 22: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/22.jpg)
Experiment ResultsExperiment Results
• Advanced Encryption StandardAdvanced Encryption Standard
![Page 23: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/23.jpg)
Experiment ResultsExperiment Results
• 3DES3DES
![Page 24: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/24.jpg)
Experiment ResultsExperiment Results
• 3DES3DES
![Page 25: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/25.jpg)
A Sample Table
CPULoad
ReadLoad
WriteLoad
Save Energy for Reads?
Save Energy for Writes?
MD5 M H M Unlikely Yes
SHA1 M VH M Unlikely Yes
SHA2 M VH M Unlikely Yes
RSA M VH M No Yes
AES VH VH M No Yes
3DES EH M L Yes Yes
![Page 26: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/26.jpg)
ConclusionConclusion• For MD5, SHA-1, SHA-2 and RSA, the For MD5, SHA-1, SHA-2 and RSA, the
bottleneck is the reading speed due to the bottleneck is the reading speed due to the network data transmitting rate.network data transmitting rate.
• For 3DES, bottleneck is CPU, because For 3DES, bottleneck is CPU, because 3DES algorithm’s workload is very high.3DES algorithm’s workload is very high.
• There is no space to save energy for There is no space to save energy for Bottleneck components Bottleneck components
![Page 27: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/27.jpg)
Major drawbacks of this researchMajor drawbacks of this research• Workload was not representativeWorkload was not representative
• Dedicated I/O workload.Dedicated I/O workload.• Did not consider access patterns of a single Did not consider access patterns of a single
user / multiple usersuser / multiple users
• Test bed was not representative Test bed was not representative • An emulated network environment.An emulated network environment.• Only evaluated a single disk rather than parallel Only evaluated a single disk rather than parallel
disksdisks
![Page 28: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/28.jpg)
Download the presentation slideshttp://www.slideshare.net/xqin74
Google: slideshare Xiao Qin
![Page 29: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/29.jpg)
Download our paper
Google: Xiao Qin
X.-J. Ruan, A. Manzanares, S. Yin, M. Nijim, and X. Qin, “Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?” Proc. 4th IEEE Int'l Conf. Networking, Architecture, and Storage, July 2009.
http://www.eng.auburn.edu/~xqin/pubs/nas09.pdf
Abstract: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5197358
![Page 30: Improve energy efficiency of secure disk systems - nas09](https://reader036.vdocuments.net/reader036/viewer/2022070301/546bb5cbaf7959cf258b4be8/html5/thumbnails/30.jpg)
QuestionsQuestions
??