Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs

被引:2
|
作者
Cheng, Wangzhao [1 ,2 ,3 ]
Zheng, Fangyu [1 ,2 ]
Pan, Wuqiong [1 ,2 ]
Lin, Jingqiang [1 ,2 ]
Li, Huorong [1 ,2 ,3 ]
Li, Bingyu [1 ,2 ,3 ]
机构
[1] Data Assurance & Commun Secur Res Ctr, Beijing, Peoples R China
[2] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Symmetric cryptographic algorithm; Jetson TX1; CUDA; SM4; implementation; Virtual private cloud storage;
D O I
10.1007/978-3-030-01701-9_28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When the public cloud provides infrastructure as a service (IaaS), the customer can outsource its data to the public cloud and release itself from the burden of storing data locally. At this point, the customer can not guarantee the security of the data in the public cloud. Encrypting data before using cloud storage is a viable solution, but frequent data encryption operations cause the original limited local computing resources to be even more stretched. In this paper, we used Jetson TX1 to build a client-side data encryption device that proxies the customer's data encryption and decryption operations. Firstly, a GPU-based SM4 implementation is carefully scheduled in the integrated GPU on Jetson TX1, including instruction-level optimization and variable improvement for data arrangement. Secondly, using zero-copy access on the device, we reduce the impact of explicit data transfer operations on overall performance. Finally, our SM4 kernel is capable of encrypting data at 30.30 Gbps on Jetson TX1, it is 26.6 times faster than the CPU-based implementation on the same platform. Furthermore, data processing throughput of the device reaches 30.19Gbps, a single Jetson TX1 owns sufficiently redundant computational power for the customer in 10 Gigabit fiber network environment.
引用
收藏
页码:512 / 528
页数:17
相关论文
共 50 条
  • [21] Data Storage and Synchronization in Private Cloud
    Hodanic, D.
    Vrkic, N.
    Tomic, M.
    2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 476 - 480
  • [22] Building Trust In Cloud Using Public Key Infrastructure A step towards cloud trust
    Kharche, Heena
    Chouhan, Deepak Singh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (03) : 26 - 31
  • [23] At your service: Industrial ops in the cloud
    Littlefield, Matthew
    InTech, 2020, 67 (3-4) : 3 - 4
  • [24] Data error locations reported by public auditing in cloud storage service
    Min-Shiang Hwang
    Cheng-Chi Lee
    Tsuei-Hung Sun
    Automated Software Engineering, 2014, 21 : 373 - 390
  • [26] Data error locations reported by public auditing in cloud storage service
    Hwang, Min-Shiang
    Lee, Cheng-Chi
    Sun, Tsuei-Hung
    AUTOMATED SOFTWARE ENGINEERING, 2014, 21 (03) : 373 - 390
  • [27] The Cloud Streaming Service Migration in Cloud Video Storage System
    Tsai, Yi-Hsing
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 672 - 677
  • [28] Building the IBM Containers cloud service
    Arnold, B.
    Baset, S. A.
    Dettori, P.
    Kalantar, M.
    Mohomed, I. I.
    Nadgowda, S. J.
    Sabath, M.
    Seelam, S. R.
    Steinder, M.
    Youssef, A. S.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2016, 60 (2-3)
  • [29] Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
    Purushothama, B.R.
    Shrinath, B.
    Amberker, B.B.
    International Journal of Information and Communication Technology, 2013, 5 (02) : 167 - 186
  • [30] Challenges in Building a Real, Large Private Cloud
    Kotsovinos, Evangelos
    ACM SIGPLAN NOTICES, 2012, 47 (07) : 1 - 1