Multi-level Crypto Disk: Secondary storage with flexible performance versus security trade-offs

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

Secondary storage devices have become increasingly vulnerable to security attacks as they are now accessed remotely, attached to mobile devices, or used in other previously unanticipated operating environments. Storage vendors have responded to this by offering solutions that encrypt data on the fly-in software or device firmware-before recording. The performance versus security trade-off offered by these secure devices is limited due to their use of only a single level of data encryption. To address these limitations, we propose the Multi-level Crypto Disk (MLCD), a generic storage device with multiple crypto levels for encoding data. Using stochastic modeling, we derive optimal policies to dynamically select crypto levels for data in an MLCD to achieve desired performance versus security trade-offs.

Original languageEnglish (US)
Title of host publicationProceedings - 18th Annual IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2010
Pages434-436
Number of pages3
DOIs
StatePublished - Nov 11 2010
Event18th Annual IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2010 - Miami Beach, FL, United States
Duration: Aug 17 2010Aug 19 2010

Publication series

NameProceedings - 18th Annual IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2010

Other

Other18th Annual IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2010
CountryUnited States
CityMiami Beach, FL
Period8/17/108/19/10

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'Multi-level Crypto Disk: Secondary storage with flexible performance versus security trade-offs'. Together they form a unique fingerprint.

  • Cite this

    Chaitanya, S., Urgaonkar, B., & Sivasubramaniam, A. (2010). Multi-level Crypto Disk: Secondary storage with flexible performance versus security trade-offs. In Proceedings - 18th Annual IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2010 (pp. 434-436). [5581369] (Proceedings - 18th Annual IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2010). https://doi.org/10.1109/MASCOTS.2010.72