Please use this identifier to cite or link to this item:
Title: Online optimization of security-sensitive real-time storage applications for NAND flash memory storage systems
Authors: Jiang, W
Ma, Y
Zhang, X
Wang, X
Shao, Z 
Keywords: keywords: {NAND circuits
Embedded systems
Flash memories
FVUC mechanism
NAND flash memory storage systems
Cryptography algorithm
Explicit deterministic timing constraints
Feedback vulnerability and utilization control mechanism
Online optimization
Probabilistic timing constraints
Proportional-integral controllers
Security-critical real-time embedded devices
Security-sensitive real-time storage applications
Real-time systems
Feedback Control
NAND Flash Memory Storage System
Real-Time System
Security-Critical Vulnerability
Issue Date: 2013
Publisher: IEEE
Source: 2013 IEEE 19th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), 19-21 August 2013, Taipei, p. 121-130 How to cite?
Abstract: With many advantages like low cost, faster and non-volatile, NAND flash memory has become a critical component in building security-critical real-time embedded devices. In this paper, we are interested in online optimization of security-sensitive storage applications, whose workloads are unpredictable but have explicit deterministic or probabilistic timing constraints and certain security constraints. Sensitive data must be stored before a specific deadline, otherwise it will lose its validity. To address these challenges, this paper presents a Feedback Vulnerability and Utilization Control (FVUC) mechanism. FVUC employs two proportional-integral controllers, the Utilization Controller and Vulnerability Controller, to build a big feedback loop that dynamically monitors the system run-time status as well as decides how many flash pages would be encrypted by a cryptography algorithm. Relied on the accurate model and design, FVUC can make a balance between the utilization and vulnerability, and achieve a better overall performance. The advantages of FVUC are verified by a series of simulation experiments under a broad range of system configurations and run-time uncertainties.
ISSN: 1533-2306
DOI: 10.1109/RTCSA.2013.6732210
Appears in Collections:Conference Paper

View full-text via PolyU eLinks SFX Query
Show full item record


Last Week
Last month
Citations as of Jul 16, 2018

Page view(s)

Last Week
Last month
Citations as of Jul 16, 2018

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.