Efficient security interface for high-performance Ceph storage systems

被引:0
作者
Parast, Fatemeh Khoda [1 ]
Damghani, Seyed Alireza [1 ]
Kelly, Brett [2 ]
Wang, Yang [3 ]
Kent, Kenneth B. [1 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Fredericton, NB, Canada
[2] 45 Drives Inc, Sydney, NS, Canada
[3] Chinese Acad Sci, Shenzhen Inst Adv Technol, Shenzhen, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2025年 / 164卷
基金
加拿大自然科学与工程研究理事会;
关键词
Security; Storage; High-performance computing; Ceph; Cryptography; CLOUD;
D O I
10.1016/j.future.2024.107571
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ceph portrays a resilient clustered storage solution with supporting object, block, and file storage capabilities with no single point of failure. Despite these qualifications, data confidentiality defines a concern in the system, as authentication and access control are the only data protection security services in Ceph. CephArmor was proposed as a third-party security interface to protect data confidentiality by adding an extra protection layer to data at rest. Despite the added layer, the initial design of the API needed to be more efficient in addressing security and performance simultaneously. In this study, we propose a new architectural design to address the associated issues with the preliminary prototype. Comprehensive performance and security analysis verify the improvement of the proposed method compared to the initial approach. The benchmark result has indicated a 37% improvement on average in IOPS, elapsed time, and bandwidth for the write benchmark compared to the initial model.
引用
收藏
页数:10
相关论文
共 39 条
[1]  
Acquaviva L, 2018, IEEE GLOB COMM CONF
[2]   The Case for Custom Storage Backends in Distributed Storage Systems [J].
Aghayev, Abutalib ;
Weil, Sage ;
Kuchnik, Michael ;
Nelson, Mark ;
Ganger, Gregory R. ;
Amvrosiadis, George .
ACM TRANSACTIONS ON STORAGE, 2020, 16 (02)
[3]  
Alam M, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P585
[4]   Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey [J].
Anwar, Shahid ;
Inayat, Zakira ;
Zolkipli, Mohamad Fadli ;
Zain, Jasni Mohamad ;
Gani, Abdullah ;
Anuar, Nor Badrul ;
Khan, Muhammad Khurram ;
Chang, Victor .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 93 :259-279
[5]  
Cawthra J., 2022, DATA INTEGRITY IDENT
[6]  
Ceph official website, 2022, About us
[7]   A model to compare cloud and non-cloud storage of Big Data [J].
Chang, Victor ;
Wills, Gary .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 57 :56-76
[8]   Carp: A cost -aware relaxed protocol for encrypted data stores [J].
Chen, Longbin ;
Chen, Li-Chiou ;
Nassar, Nader .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53 (53)
[9]   BLESS: Object level encryption security for object-based storage system [J].
Feng, Dan ;
Chen, Junjian ;
Liu, Jingning ;
Wang, Zhikun .
MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) :188-197
[10]  
Giannakos F., 2014, login Usenix Mag., V39