Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (5): 59-70.doi: 10.11959/j.issn.2096-109x.2023072
• Papers • Previous Articles
Zhihua FENG, Yuxuan ZHANG, Chong LUO, Jianing WANG
Revised:
2023-03-21
Online:
2023-10-01
Published:
2023-10-01
Supported by:
CLC Number:
Zhihua FENG, Yuxuan ZHANG, Chong LUO, Jianing WANG. High-performance reconfigurable encryption scheme for distributed storage[J]. Chinese Journal of Network and Information Security, 2023, 9(5): 59-70.
"
类型 | 架构型号 | 工艺/nm | 峰值性能/Gbit.s-1 | 实测性能/Gbit.s-1 | 功耗/W | 能量效率/Gbit/(s.W)-1 |
CGRA | 本文 | 28 | 25 | 9.37 | 3.50 | 7.14 |
Cryptoratpor[ | 45 | 128 | — | 6.18 | 20.72 | |
Virtex-5[ | 65 | 58.75 | — | 1.40 | 42.02 | |
FPGA | zedboard[ | — | — | 0.564 | 2.18 | — |
Virtex-7[ | — | 49.66 | — | — | — | |
ASIC | 定制设计[ | 45 | 53 | — | 0.16 | 341.94 |
定制设计[ | 130 | 25.60 | — | 0.04 | 627.14 | |
GPU | Gtx295[ | 55 | 59.6 | — | 288.96 | 0.21 |
注:文献中未说明的密码芯片的相关数据在表格中用“—”标明。 |
[1] | LI Y . Intelligent cryptography approach for secure distributed big data storage in cloud computing[J]. Information Ences, 2016: 103-115. |
[2] | KAPUSTA K , MEMMI G . Enhancing data protection in a distributed storage environment using structure-wise fragmentation and dispersal of encrypted data[C]// IEEE International Conference on Big Data Science and Engineering; IEEE International Conference on Trust,Security and Privacy In Computing and Communications. 2017. |
[3] | 桑杰, 许雪姣, 刘硕 ,等. 基于国密算法的分布式加密存储研究[J]. 数据通信, 2020,(1): 4. |
SANG J , XU X J , LIU S ,et al. Research on distributed encrypted storage based on national security algorithm[J]. Data Communication, 2020,(1): 4. | |
[4] | 杨锦江 . 基于可重构计算的密码处理器关键技术研究[D]. 南京:东南大学, 2018. |
YANG J J . Research on key technologies of reconfigurable cryptographic processors[D]. Nanjing:Southeast University, 2018. | |
[5] | FT A , ASA B , AA C ,et al. A new lightweight cryptographic algorithm for enhancing data security in cloud computing-sciencedirect[J]. Global Transitions Proceedings, 2021. |
[6] | SMITH A , RILEY J , SYED M ,et al. Exploring untrusted distributed storage for high performance computing[C]// The Practice and Experience in Advanced Research Computing. 2019. |
[7] | ABDEL-KADER R F , EL-SHERIF S H , RIZK R Y . Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing[J]. International Journal of Electrical and Computer Engineering, 2020(3). |
[8] | MARYAM K , SHAHZAD A , FARIA F ,et al. Privacy-aware genetic algorithm based data security framework for distributed cloud storage[J]. Microprocessors and Microsystems, 2022(94). |
[9] | 杜瑞忠, 王少泫, 田俊峰 . 基于封闭环境加密的云存储方案[J]. 通信学报, 2017,38(7): 10. |
DU R Z , WANG S X , TIAN J F . Cloud storage scheme based on closed-box encryption[J]. Journal on Communications, 2017,38(7): 10. | |
[10] | 袁航 . 动态可重构密码芯片关键技术研究[D]. 北京:清华大学, 2019. |
YUAN H . Research on key technologies of dynamic reconfigurable cryptographic chip[D]. Beijing:Tsinghua University, 2019. | |
[11] | SAYILAR G , CHIOU D . Cryptoraptor:high throughput reconfigurable cryptographic processor[C]// IEEE/ACM International Conference on Computer-aided Design. 2014. |
[12] | BULENS P , STANDAERT F X , QUISQUATER J J ,et al. Implementation of the AES-128 on Virtex-5 FPGAs[C]// DBLP. 2008. |
[13] | LI X , CAO C , LI P ,et al. Energy-efficient hardware implementation of LUKS PBKDF2 with AES on FPGA[C]// Trustcom/Bigdatase/Ispa. 2017. |
[14] | SMEKAL D , HAJNY J , MARTINASEK Z . Comparative analysis of different implementations of encryption algorithms on FPGA network cards[C]// IFAC Conference on Programmable Devices and Embedded Systems. 2018. |
[15] | NISHIKAWA N , IWAI K , KUROKAWA T . High-performance symmetric block ciphers on multicore CPU and GPU[J]. International Journal of Networking & Computing, 2012,2(2): 251-268. |
[16] | RAHIMUNNISA K , KARTHIGAIKUMAR P , CHRISTY N ,et al. PSP:parallel sub-pipelined architecture for high throughput AES on FPGA and ASIC[J]. Central European Journal of Computer Science, 2013,3(4): 173-186. |
[17] | BOS J W , OSVIK D A , STEFAN D . Fast implementations of AES on various platforms[J]. IACR Cryptology Eprint Archive, 2009:501. |
[18] | 王博 . 高能效可重构密码芯片架构及其抗物理攻击技术研究[D]. 北京:清华大学, 2018. |
WANG B . Energy efficient architecture and physical attack countermeasures for reconfigurable cryptographic processors[D]. Beijing:Tsinghua University, 2018. | |
[19] | 张包铨 . 内核态时序数据存储系统设计与实现[D]. 成都:电子科技大学, 2022. |
ZHANG B S . Design and implementation of time series data storage system in kernel space[D]. Chengdu:University of Electronic Science and Technology of China, 2022. | |
[20] | 赵南雨, 陈莉君 . 一种面向Hadoop中间数据存储的混合存储系统[J]. 信息技术, 2017(11): 161-166. |
ZHAO N Y , CHEN L J . Hybrid storage system focus on Hadoop intermediate storing[J]. Information Technology, 2017(11): 161-166. | |
[21] | 周山东, 宋新芳, 金波 ,等. 基于TCM的全盘加密系统的研究与实现[J]. 计算机工程与设计, 2012,33(9): 6. |
ZHOU S D , SONG X F , JIN B ,et al. Research and implementation of trusted full disk encryption system based on TCM[J]. Computer Engineering and Design, 2012,33(9): 6. | |
[22] | BERRYMAN A , CALYAM P , HONIGFORD M ,et al. VDBench:a benchmarking toolkit for thin-client based virtual desktop environments[C]// IEEE Second International Conference on Cloud Computing Technology & Science. 2010. |
[1] | Honggang LIN, Junjing ZHU, Lin CHEN. Metric-based learning approach to botnet detection with small samples [J]. Chinese Journal of Network and Information Security, 2023, 9(5): 33-47. |
[2] | Jinwei WANG, Zhengjia CHEN, Xue XIE, Xiangyang LUO, Bin MA. Review of malware detection and classification visualization techniques [J]. Chinese Journal of Network and Information Security, 2023, 9(5): 1-20. |
[3] | Yifan HE, Jie ZHANG, Weiming ZHANG, Nenghai YU. Privacy leakage risk assessment for reversible neural network [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 29-39. |
[4] | Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG. Lightweight terminal cross-domain authentication protocol in edge computing environment [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 74-89. |
[5] | Degang WANG, Yi SUN, Chuanxin ZHOU, Qi GAO, Fan YANG. Malicious code within model detection method based on model similarity [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 90-103. |
[6] | Yilong WANG, Zhenyu LI, Daofu GONG, Fenlin LIU. Image double fragile watermarking algorithm based on block neighborhood [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 38-48. |
[7] | Renfeng CHEN, Hongbin ZHU. Research on credit card transaction security supervision based on PU learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 73-78. |
[8] | Guanyun FENG, Cai FU, Jianqiang LYU, Lansheng HAN. Insider threat detection based on operational attention and data augmentation [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 102-112. |
[9] | Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG. Software diversity evaluating method based on gadget feature analysis [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 161-173. |
[10] | Peng HOU, Zhixin LI, Fei ZHANG, Xu SUN, Dan CHEN, Yihao CUI, Hanbing ZHANG, Yinan JIN, Hongfeng CHAI. Technology and practice of intelligent governance for financial data security [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 174-187. |
[11] | Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO. Anonymous trust management scheme of VANET based on attribute signature [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 33-45. |
[12] | Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG. Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80. |
[13] | Xunxun CHEN, Mingzhe LI, Ning LYU, Liang HUANG. Intrinsic assurance: a systematic approach towards extensible cybersecurity [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 92-102. |
[14] | Jiashuo SONG, Zhenzhen LI, Haiyang DING, Zichen LI. Efficient and fully simulated oblivious transfer protocol on elliptic curve [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 158-166. |
[15] | Fenghua LI, Hui LI, Ben NIU, Weidong QIU. Academic connotation and research trends of privacy computing [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 1-8. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|