{"id":1150,"date":"2022-04-06T11:31:43","date_gmt":"2022-04-06T15:31:43","guid":{"rendered":"https:\/\/ece.ncsu.edu\/?p=246566"},"modified":"2022-04-06T11:31:43","modified_gmt":"2022-04-06T15:31:43","slug":"new-technique-offers-faster-security-for-non-volatile-memory-tech","status":"publish","type":"post","link":"https:\/\/my.ece.ncsu.edu\/communications\/2022\/new-technique-offers-faster-security-for-non-volatile-memory-tech\/","title":{"rendered":"New Technique Offers Faster Security for Non-Volatile Memory Tech"},"content":{"rendered":"<p><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/ece.ncsu.edu\/wp-content\/uploads\/2022\/04\/awad-nvm-2022-header-1024x576.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"purely decorative image of hands typing\" loading=\"lazy\" srcset=\"https:\/\/ece.ncsu.edu\/wp-content\/uploads\/2022\/04\/awad-nvm-2022-header-980x551.jpg 980w, https:\/\/ece.ncsu.edu\/wp-content\/uploads\/2022\/04\/awad-nvm-2022-header-480x270.jpg 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/p>\n<p>Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits faster performance than existing software security technologies.<\/p>\n<p>\u201cNVMs are an emerging technology that allows rapid access to the data, and retains data even when a system crashes or loses power,\u201d says Amro Awad, senior author of a paper on the work and an assistant professor of electrical and computer engineering at North Carolina State University. \u201cHowever, the features that give NVMs these attractive characteristics also make it difficult to encrypt files on NVM devices \u2013 which raises security concerns. We\u2019ve developed a way to secure files on NVM devices without sacrificing the speed that makes NVMs attractive.\u201d<\/p>\n<p>\u201cOur technique allows for file-level encryption in fast NVM memories, while cutting the related execution time significantly,\u201d says Kazi Abu Zubair, first author of the paper and a Ph.D. student at NC State.<\/p>\n<p>Traditionally, computers use two types of data storage. Dynamic random access memory (DRAM) allows quick access to stored data, but will lose that data if the system crashes. Long-term storage technologies, such as hard drives, are good at retaining data even if a system loses power \u2013 but store the data in a way that makes it slower to access.<\/p>\n<p>NVMs combine the best features of both technologies. However, securing files on NVM devices can be challenging.<\/p>\n<p>Existing methods for file system encryption use software, which is not particularly fast. Historically, this wasn\u2019t a problem because the technologies for accessing file data from long-term storage devices weren\u2019t particularly fast either.<\/p>\n<p>\u201cBut now that NVMs are allowing faster access to file data, the software approach to file encryption has become a problem, because it slows down overall operations,\u201d Abu Zubair says.<\/p>\n<p>\u201cTo address this challenge, we\u2019ve developed a novel architecture that incorporates some elements of the encryption and decryption process into hardware, which is faster than software. As a result, processes that allow users to store and retrieve file data securely are significantly faster.\u201d<\/p>\n<p>In simulations, the researchers found that using their novel encryption architecture to secure files in NVMs slowed down operations by 3.8%, when running workloads that were representative of real-world applications. When using software approaches to provide security for the same workloads, operations slowed by about 200%.<\/p>\n<p>\u201cIf this was implemented in commercial processors, it would significantly improve performance for secure file operation in large data centers and cloud systems,\u201d Abu Zubair says.<\/p>\n<p>\u201cWhile this work addresses file encryption, we think it is important to assess other security functions \u2013 such as auditing and run-time ransomware detection \u2013in the context of direct access file systems,\u201d says Awad. \u201cAnd addressing those security functions using traditional software approaches can also slow system performance. We\u2019re optimistic that our hybrid hardware\/software approach may be able to improve performance for those functions as well \u2013 that\u2019s an area we\u2019re exploring.\u201d<\/p>\n<p>The paper, \u201cFilesystem Encryption or Direct-Access for NVM Filesystems? Let\u2019s Have Both!,\u201d will be presented April 5 at the 28th IEEE International Symposium on High-Performance Computer Architecture (HPCA-22). The paper was co-authored by David Mohaisen of the University of Central Florida.<\/p>\n<p>The work was done with support from the National Science Foundation under grant 1814417.<\/p>\n<p class=\"has-text-align-center\">-shipman-<\/p>\n<p><strong>Note to Editors:<\/strong> The study abstract follows.<\/p>\n<p><strong>\u201cFilesystem Encryption or Direct-Access for NVM Filesystems? Let\u2019s Have Both!\u201d<\/strong><\/p>\n<p><em>Authors<\/em>: Kazi Abu Zubair and Amro Awad, North Carolina State University; David Mohaisen, University of Central Florida<\/p>\n<p><em>Presented<\/em>: April 5, 2022, The 28th IEEE International Symposium on High-Performance Computer Architecture (HPCA-22)<\/p>\n<p><strong>Abstract:<\/strong> Emerging Non-Volatile Memories (NVMs) are promising candidates to build ultra-low idle power memory and storage devices in future computing systems. Unlike DRAM, NVMs do not require frequent refresh operations, and they can retain data after crashes and power loss. With such features, NVM memory modules can be used partly as conventional memory to host memory pages and partly as file storage to host filesystems and persistent data. Most importantly, and unlike current storage technologies, NVMs can be directly attached to the memory bus and accessed through conventional load\/store operations. As NVMs feature ultra-low access latency, it is necessary to minimize software overheads for accessing files to enable the full potential. In legacy storage devices, e.g., Flash and Hard-disk drives, access latency dominates the software overheads. However, emerging NVMs\u2019 performance can be burdened by the software overheads since memory access latency is minimal. Modern Operating Systems (OSes) allow direct-access (DAX) for NVM-hosted files through direct load\/store operations by eliminating intermediate software layers. Unfortunately, we observe that such a direction ignores filesystem encryption and renders most of the current filesystem encryption implementations inapplicable to future NVM systems. In this paper, we propose a novel hardware\/software co-design architecture that enables transparent filesystem encryption without sacrificing the direct-access feature of files in emerging NVMs with minimal change in OS and memory controller. Our proposed model incurs a negligible overall slowdown of 3.8% for workloads representative of real-world applications, while software-based encryption can incur as high as 5x slowdown for some applications.<\/p>\n<p><em>This post was <a href=\"https:\/\/news.ncsu.edu\/2022\/04\/faster-security-for-nvms\/\">originally published<\/a> in NC State News.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/ece.ncsu.edu\/wp-content\/uploads\/2022\/04\/awad-nvm-2022-header-1024x576.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"purely decorative image of hands typing\" loading=\"lazy\" srcset=\"https:\/\/ece.ncsu.edu\/wp-content\/uploads\/2022\/04\/awad-nvm-2022-header-980x551.jpg 980w, https:\/\/ece.ncsu.edu\/wp-content\/uploads\/2022\/04\/awad-nvm-2022-header-480x270.jpg 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\">Researchers used a hybrid hardware-software approach to improve file system security for NVMs.<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ncst_dynamicHeaderBlockName":"","ncst_dynamicHeaderData":"","ncst_content_audit_freq":"","ncst_content_audit_date":"","ncst_content_audit_display":false,"ncst_backToTopFlag":"","footnotes":""},"categories":[180],"tags":[],"class_list":["post-1150","post","type-post","status-publish","format-standard","hentry","category-research"],"displayCategory":null,"acf":{"ncst_posts_meta_modified_date":null},"_links":{"self":[{"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/posts\/1150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/comments?post=1150"}],"version-history":[{"count":2,"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/posts\/1150\/revisions"}],"predecessor-version":[{"id":2466,"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/posts\/1150\/revisions\/2466"}],"wp:attachment":[{"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/media?parent=1150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/categories?post=1150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/tags?post=1150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}