Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/19919
Title: Adaptive security management of real-time storage applications over NAND based storage systems
Authors: Jiang, W
Ma, Y
Zhang, X
Wang, X
Shao, Z 
Keywords: Feedback control
NAND flash memory
Real-time
Scheduling
Security-critical
Storage application
Issue Date: 2015
Publisher: Academic Press
Source: Journal of network and computer applications, 2015, v. 52, p. 139-153 How to cite?
Journal: Journal of Network and Computer Applications 
Abstract: Abstract Embedded devices are much easier to be stolen or lost due to the characteristics of mobility and less caring, which may result in the information disclosure and privacy loss without any security protection of critical data. With the advantages of low cost and fast access speed, non-volatile memories (NVMs) like NAND flash memory have become a critical component in building security-critical real-time embedded devices. Therefore, to improve the security protection of NVM-based embedded systems becomes a great challenge. In this paper, we are interested in online optimization of security-sensitive storage applications over modern NVM-based embedded systems, whose workloads are unpredictable but have explicit timing constraint and certain security constraint. Sensitive data must be stored before a specific deadline, otherwise it will lose its validity. To address these challenges, this paper presents a Feedback Vulnerability and Utilization Control (FVUC) mechanism. FVUC employs two proportional-integral controllers, the Utilization Controller and the Vulnerability Controller, to build a big feedback loop which dynamically monitors the system run-time status as well as decides how many flash pages would be encrypted by a cryptography service. Relied on the accurate model and design, FVUC can make a balance between the utilization and vulnerability, and achieve a better overall performance. Based on synthetic experiments, we obtain that FVUC can fully beat other three mechanisms on the overall performance with acceptable time overhead. Equipped with proportional-integral controller, FVUC can make the system more stable than the one with only proportional controller. The proposed mechanism can be utilized to resist on-line confidential attack and even achieve the off-line privacy protection when embedded devices are lost or stolen.
URI: http://hdl.handle.net/10397/19919
ISSN: 1861-4728
DOI: 10.1016/j.jnca.2015.02.009
Appears in Collections:Journal/Magazine Article

Access
View full-text via PolyU eLinks SFX Query
Show full item record

SCOPUSTM   
Citations

1
Last Week
0
Last month
0
Citations as of Feb 21, 2017

WEB OF SCIENCETM
Citations

1
Last Week
0
Last month
0
Citations as of Mar 1, 2017

Page view(s)

22
Last Week
2
Last month
Checked on Feb 26, 2017

Google ScholarTM

Check

Altmetric



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.