Secure Cloud Storage and Computing Using Reconfigurable Hardware
|
|
|
- Lambert Garrison
- 9 years ago
- Views:
Transcription
1 Secure Cloud Storage and Computing Using Reconfigurable Hardware Victor Costan, Brandon Cho, Srini Devadas Motivation Computing is more cost-efficient in public clouds but what about security?
2 Cloud Applications and Security Models Individual user backs up public data Upload file on Amazon S3 and anyone can download it User only concerned with integrity and reliability of storage User backs up private data (e.g., photographs) User can encrypt data prior to storing for privacy User concerned with integrity and reliability of storage User wants to back up and share photographs on Flickr User needs to trust integrity of application, e.g., Wordpress that is used to share photographs User wants to run a private application on private data (e.g., access private database) User has to trust the cloud provider to maintain privacy and integrity What Public Clouds Cannot Do (Yet) Guarantee integrity and privacy of computation Integrity and privacy can be guaranteed if cloud servers have trusted modules (e.g., TPMs, TEMs) Performance loss a significant concern Encrypted computation can be performed in theory using fully homomorphic encryption techniques (Gentry, 2008) These schemes are not yet practical For these reasons private clouds are used in database applications and other applications where privacy is crucial Can we secure public clouds?
3 Trusted Computing Bases 1. Trust the cloud providerʼs entire server The status quo: Amazon S3 and EBS Cheap, but no security guarantees 2. Trust a TPM (Trusted Platform Module) attached to server Very good security boundary: one well-studied chip Low performance, low throughput 3. The best of both worlds Donʼt trust weak components: server OS, system buses, RAM Do trust: TPM-like chip, plus high-performance chip (FPGA / ASIC) Security boundary is still good Good performance and throughput System Design
4 Design: System Architecture FPGA / ASIC (Trusted) Secure NVRAM Chip Client System Bus Internet CPU Disk RAM Network Card Attack Vectors for Trusted Storage Application Hard Disk tampering Try to inject invalid data (easy) Replay attacks (harder) Bugs from other applications running on the server OS compromise Physical tampering Active system bus tapping (e.g., Xbox) RAM glitching (e.g., PlayStation 3) Hard disk modification or roll-back to a previous state
5 Integrity Verification Client/TCB write Untrusted Disk INTEGRITY VERIFICATION read Integrity Verification Check if a value from untrusted disk is the most recent value stored at the address by the client MAC-based Integrity Verification? Client/TCB write Untrusted Disk Address 0x45 Keyed MAC V E RI F Y read 124, MAC(0x45, 124) 120, MAC(0x45, IGNORE 120) Message Authentication Code (MAC) is often used to authenticate a network message Store MAC(address, value) on writes, and check the MAC on reads Does NOT work Replay attacks Need to securely remember the untrusted disk state
6 Design: Trusted Storage on Untrusted Disks 160-bit hash in trusted memory authenticates 1TB disk 20 levels h 5 =h(h 1 h 2 ) Root Hash h 7 =h(h 5 h 6 ) h 6 =h(h 3 h 4 ) Root hash matches iff all blocks match Nodes hash their children h 1 =h(b 1 ) h 2 =h(b 2 ) h 3 =h(b 3 ) h 4 =h(b 4 ) Leaves hash their blocks B 1 B 2 B 3 B 4 Disk divided into 1MB blocks Design: Hash Tree Cache Server stores entire hash tree in RAM FPGA has a cache that stores a subset of nodes Server tells FPGA what nodes to store Cache management commands Node Hash Verified 1 fabe Y 2 e6fc Y 4 53a8 Y 5 b2ce Y
7 Design: Hash Tree Cache - Efficiency Checking leaf 33 requires 10 node loads for a cold cache on this example Remember the root is always loaded in the cache /25/10 Design: Hash Tree Cache - Efficiency Checking leaf 38 only 4 node loads, because 9 is already in the cache and verified Server can predict client requests and manage cache for high performance /25/10
8 Design: Maintaining FPGA State FPGA 32nm, no NVRAM Physically Unclonable Function (PUF) or Battery-backed Encryption Key E-Fuses: hash of public key for the certificate of the trusted memory chip Trusted Memory Low performance Smart Card-family chip Encryption engine, manufacturer certificate NVRAM holding FPGAʼs root hash Implementation Decisions
9 Design: System Architecture Revisited FPGA / ASIC (Trusted) Secure NVRAM Chip Client System Bus Internet CPU Disk RAM Network Card Implementation: Storage Prototype uses desktop-class 7,200 RPM HDD with 1TB Normal servers would use 10,000 RPM disks Hash tree block size: 1Mb Model Throughput Latency GB / $ 7,200 RPM HDD 70 MB/s 12 ms 10 10,000 RPM HDD 100 MB/s 8 ms ,000 RPM HDD 130 MB/s 6 ms 1 SSD 250 MB/s 0.065ms 0.4
10 Implementation: SHA-1 Hash Engine High-throughput 4-stage pipelined SHA-1 implementation 6 SHA-1 engines, 4 simultaneous hashes / engine Hash tree logic (with cache) uses 70% of the silicon, SHA-1 uses 30% FPGA Model Throughput Latency FPGA Cost Virtex-5 FPGA 20.4 GB/s 600 ns $50 Virtex-6 FPGA 21.6 GB/s 550 ns $75 Implementation: Hash Tree Cache 188 bits per cache entry, entries / MB 1 TB disk, 1MB nodes path length is 20 nodes Prototype: 1MB cache on FPGA, avg. 3 node loads / block Production: 8MB cache (like Core i7), avg. 1 load / block Cache size, strategy Hit rate Loads / op Verifies / write 32kB, LRU 50% kB, LRU 75% MB, LRU 85% MB, LRU 95% 1 20
11 Implementation: FPGA CPU Bus Prototype uses Gigabit Ethernet at 80% capacity Production servers should use 16-lane PCI-Express Model PCI Express x16 SATA II PCI Express x1 Ethernet USB 2.0 Throughput 4 GB/s 384 MB/s 250 MB/s 100 MB/s 60 MB/s Implementation: Trusted Memory Chip Irrelevant for performance, used for booting the FPGA Smart card technology Prototype: JavaCard 2.2.1, 32kB EEPROM 2kB RAM, 100ms / op Estimated requirements: 4kB ROM, 4kB EEPROM Production: any $1 secure chip with a processor and NVRAM Secure NVRAM to Server Bus Prototype: USB Production: USB, LPC Irrelevant for system performance, only used at boot
12 Implementation: Prototype System Virtex 5 XC5VLX110T JCOP21 36k MacBookPro6,2 Core i GB RAM Gigabit Ethernet Ethernet USB 1.0 SATA II HyperTransport PCI-E x1 Cat 5 cable Core i TB 7,200 RPM PC1066 2GB Generic Gigabit Ethernet Implementation: Performance Overview 5.2GB/s 96us 100MB/s 200us 100MB/s 200us 384MB/s 250MB/s 100MB/s 8ms 100MB/s 200us
13 Implementation: Overhead Analysis for the Prototype Client Server Bandwidth overhead: 0.002% Operation: 1 HMAC (20 bytes) per 1MB = 0.002% Handshake: extra secret exchange piggybacks on SSL: 5% Latency overhead (1 client): 4% Without security: 8.2ms / request With security: 8.5ms / request Latency overhead = the latency of a very fast Internet hop No throughput overhead (N-clients) With or without security: 100MB/s Need 40 HDDs to saturate PCI-E x16, 52 HDDs to saturate FPGA Ongoing Work
14 Other Applications FPGA can be used to load user-specified circuits and perform arbitrary computation with security guarantees Applications: encrypted image search, financial calculations Potential applications in highly regulated industries, e.g. medical record keeping and processing, secure financial services Acknowledgement: Work was funded by Quanta Corporation
FPGAs for Trusted Cloud Computing
FPGAs for Trusted Cloud Computing Traditional Servers Datacenter Cloud Servers Datacenter Cloud Manager Client Client Control Client Client Control 2 Existing cloud systems cannot offer strong security
enabling Ultra-High Bandwidth Scalable SSDs with HLnand
www.hlnand.com enabling Ultra-High Bandwidth Scalable SSDs with HLnand May 2013 2 Enabling Ultra-High Bandwidth Scalable SSDs with HLNAND INTRODUCTION Solid State Drives (SSDs) are available in a wide
Solid State Drive Architecture
Solid State Drive Architecture A comparison and evaluation of data storage mediums Tyler Thierolf Justin Uriarte Outline Introduction Storage Device as Limiting Factor Terminology Internals Interface Architecture
Big Picture. IC220 Set #11: Storage and I/O I/O. Outline. Important but neglected
Big Picture Processor Interrupts IC220 Set #11: Storage and Cache Memory- bus Main memory 1 Graphics output Network 2 Outline Important but neglected The difficulties in assessing and designing systems
Embedded Trusted Computing on ARM-based systems
1 / 26 Embedded Trusted Computing on ARM-based systems Martin Schramm, M.Eng. 10.04.2014 Agenda 2 of 26 [email protected] Embedded computing platforms have become omnipresent intend to alleviate
Certifying Program Execution with Secure Processors
Certifying Program Execution with Secure Processors Benjie Chen Robert Morris MIT Laboratory for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects
The Reduced Address Space (RAS) for Application Memory Authentication
The Reduced Address Space (RAS) for Application Memory Authentication David Champagne, Reouven Elbaz and Ruby B. Lee Princeton University, USA Introduction Background: TPM, XOM, AEGIS, SP, SecureBlue want
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *If you are using
Using AES 256 bit Encryption
Using AES 256 bit Encryption April 16 2014 There are many questions on How To Support AES256 bit encryption in an Industrial, Medical or Military Computer System. Programmable Encryption for Solid State
Computer Systems Structure Input/Output
Computer Systems Structure Input/Output Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Examples of I/O Devices
HP Z Turbo Drive PCIe SSD
Performance Evaluation of HP Z Turbo Drive PCIe SSD Powered by Samsung XP941 technology Evaluation Conducted Independently by: Hamid Taghavi Senior Technical Consultant June 2014 Sponsored by: P a g e
Networking Virtualization Using FPGAs
Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical and Computer Engineering University of Massachusetts,
Using Synology SSD Technology to Enhance System Performance Synology Inc.
Using Synology SSD Technology to Enhance System Performance Synology Inc. Synology_SSD_Cache_WP_ 20140512 Table of Contents Chapter 1: Enterprise Challenges and SSD Cache as Solution Enterprise Challenges...
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
The Data Placement Challenge
The Data Placement Challenge Entire Dataset Applications Active Data Lowest $/IOP Highest throughput Lowest latency 10-20% Right Place Right Cost Right Time 100% 2 2 What s Driving the AST Discussion?
Agenda. Enterprise Application Performance Factors. Current form of Enterprise Applications. Factors to Application Performance.
Agenda Enterprise Performance Factors Overall Enterprise Performance Factors Best Practice for generic Enterprise Best Practice for 3-tiers Enterprise Hardware Load Balancer Basic Unix Tuning Performance
Arrow ECS sp. z o.o. Oracle Partner Academy training environment with Oracle Virtualization. Oracle Partner HUB
Oracle Partner Academy training environment with Oracle Virtualization Technology Oracle Partner HUB Overview Description of technology The idea of creating new training centre was to attain light and
Quantifying Hardware Selection in an EnCase v7 Environment
Quantifying Hardware Selection in an EnCase v7 Environment Introduction and Background The purpose of this analysis is to evaluate the relative effectiveness of individual hardware component selection
Accelerating I/O- Intensive Applications in IT Infrastructure with Innodisk FlexiArray Flash Appliance. Alex Ho, Product Manager Innodisk Corporation
Accelerating I/O- Intensive Applications in IT Infrastructure with Innodisk FlexiArray Flash Appliance Alex Ho, Product Manager Innodisk Corporation Outline Innodisk Introduction Industry Trend & Challenge
Chapter 4 System Unit Components. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 4 System Unit Components Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Differentiate among various styles of system units on desktop computers, notebook
Introduction to I/O and Disk Management
Introduction to I/O and Disk Management 1 Secondary Storage Management Disks just like memory, only different Why have disks? Memory is small. Disks are large. Short term storage for memory contents (e.g.,
File System Management
Lecture 7: Storage Management File System Management Contents Non volatile memory Tape, HDD, SSD Files & File System Interface Directories & their Organization File System Implementation Disk Space Allocation
Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms
Distributed File System 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributed File System Don t move data to workers move workers to the data! Store data on the local disks of nodes
IBM Europe Announcement ZG08-0232, dated March 11, 2008
IBM Europe Announcement ZG08-0232, dated March 11, 2008 IBM System x3450 servers feature fast Intel Xeon 2.80 GHz/1600 MHz, 3.0 GHz/1600 MHz, both with 12 MB L2, and 3.4 GHz/1600 MHz, with 6 MB L2 processors,
Hadoop: Embracing future hardware
Hadoop: Embracing future hardware Suresh Srinivas @suresh_m_s Page 1 About Me Architect & Founder at Hortonworks Long time Apache Hadoop committer and PMC member Designed and developed many key Hadoop
Price/performance Modern Memory Hierarchy
Lecture 21: Storage Administration Take QUIZ 15 over P&H 6.1-4, 6.8-9 before 11:59pm today Project: Cache Simulator, Due April 29, 2010 NEW OFFICE HOUR TIME: Tuesday 1-2, McKinley Last Time Exam discussion
361 Computer Architecture Lecture 14: Cache Memory
1 361 Computer Architecture Lecture 14 Memory cache.1 The Motivation for s Memory System Processor DRAM Motivation Large memories (DRAM) are slow Small memories (SRAM) are fast Make the average access
Chapter 6. 6.1 Introduction. Storage and Other I/O Topics. p. 570( 頁 585) Fig. 6.1. I/O devices can be characterized by. I/O bus connections
Chapter 6 Storage and Other I/O Topics 6.1 Introduction I/O devices can be characterized by Behavior: input, output, storage Partner: human or machine Data rate: bytes/sec, transfers/sec I/O bus connections
Lab Evaluation of NetApp Hybrid Array with Flash Pool Technology
Lab Evaluation of NetApp Hybrid Array with Flash Pool Technology Evaluation report prepared under contract with NetApp Introduction As flash storage options proliferate and become accepted in the enterprise,
Discovering Computers 2011. Living in a Digital World
Discovering Computers 2011 Living in a Digital World Objectives Overview Differentiate among various styles of system units on desktop computers, notebook computers, and mobile devices Identify chips,
High Performance. CAEA elearning Series. Jonathan G. Dudley, Ph.D. 06/09/2015. 2015 CAE Associates
High Performance Computing (HPC) CAEA elearning Series Jonathan G. Dudley, Ph.D. 06/09/2015 2015 CAE Associates Agenda Introduction HPC Background Why HPC SMP vs. DMP Licensing HPC Terminology Types of
Opal SSDs Integrated with TPMs
Opal SSDs Integrated with TPMs August 21, 2012 Robert Thibadeau, Ph.D. U.S. Army SSDs Must be Opal s We also Studied using the TPM (Trusted Platform Module) with an Opal SSD (Self-Encrypting Drive) 2 Security
File System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System
CS341: Operating System Lect 36: 1 st Nov 2014 Dr. A. Sahu Dept of Comp. Sc. & Engg. Indian Institute of Technology Guwahati File System & Device Drive Mass Storage Disk Structure Disk Arm Scheduling RAID
An Overview of Flash Storage for Databases
An Overview of Flash Storage for Databases Vadim Tkachenko Morgan Tocker http://percona.com MySQL CE Apr 2010 -2- Introduction Vadim Tkachenko Percona Inc, CTO and Lead of Development Morgan Tocker Percona
Quiz for Chapter 6 Storage and Other I/O Topics 3.10
Date: 3.10 Not all questions are of equal difficulty. Please review the entire quiz first and then budget your time carefully. Name: Course: Solutions in Red 1. [6 points] Give a concise answer to each
Trusted Platforms for Homeland Security
Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business
1 Storage Devices Summary
Chapter 1 Storage Devices Summary Dependability is vital Suitable measures Latency how long to the first bit arrives Bandwidth/throughput how fast does stuff come through after the latency period Obvious
QuickSpecs. PCIe Solid State Drives for HP Workstations
Introduction Storage technology with NAND media is outgrowing the bandwidth limitations of the SATA bus. New high performance Storage solutions will connect directly to the PCIe bus for revolutionary performance
Parallels Cloud Storage
Parallels Cloud Storage White Paper Best Practices for Configuring a Parallels Cloud Storage Cluster www.parallels.com Table of Contents Introduction... 3 How Parallels Cloud Storage Works... 3 Deploying
SharePoint Performance Optimization
White Paper AX Series SharePoint Performance Optimization September 2011 WP_SharePoint_091511.1 TABLE OF CONTENTS 1 Introduction... 2 2 Executive Overview... 2 3 SSL Offload... 4 4 Connection Reuse...
Embedded Operating Systems in a Point of Sale Environment. White Paper
Embedded Operating Systems in a Point of Sale Environment White Paper December 2008 Contents Embedded Operating Systems in a POS Environment... 3 Overview... 3 POS Operating Systems... 3 Operating Systems
CHAPTER 7: The CPU and Memory
CHAPTER 7: The CPU and Memory The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
Virtualised MikroTik
Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand
Terms of Reference Microsoft Exchange and Domain Controller/ AD implementation
Terms of Reference Microsoft Exchange and Domain Controller/ AD implementation Overview Maldivian Red Crescent will implement it s first Microsoft Exchange server and replace it s current Domain Controller
RAID. RAID 0 No redundancy ( AID?) Just stripe data over multiple disks But it does improve performance. Chapter 6 Storage and Other I/O Topics 29
RAID Redundant Array of Inexpensive (Independent) Disks Use multiple smaller disks (c.f. one large disk) Parallelism improves performance Plus extra disk(s) for redundant data storage Provides fault tolerant
Hardware and Software Requirements for Installing California.pro
Hardware and Requirements for Installing California.pro This document lists the hardware and software requirements to install and run California.pro. Workstation with SQL Server Recommended: 64-Bit Windows
Logical Operations. Control Unit. Contents. Arithmetic Operations. Objectives. The Central Processing Unit: Arithmetic / Logic Unit.
Objectives The Central Processing Unit: What Goes on Inside the Computer Chapter 4 Identify the components of the central processing unit and how they work together and interact with memory Describe how
QuickSpecs. SATA (Serial ATA) Hard Drives for HP Workstations Overview
Overview Introduction SSATA 7200 rpm drives are our standard high bandwidth hard drive storage options; most workstation models are also available with high performance 10K rpm rotation speeds. Storage
QUESTIONS & ANSWERS. ItB tender 72-09: IT Equipment. Elections Project
QUESTIONS & ANSWERS ItB tender 72-09: IT Equipment. Elections Project In lot 1, position 1 - Server for Data Base 1. Q: You order Microsoft Windows Server 2008, 64 bit, Enterprise, License with 25 or more
Cisco Small Business NSS2000 Series Network Storage System
Cisco Small Business NSS2000 Series Network Storage System Cisco NSS2000 2-Bay Gigabit Storage System Chassis Cisco NSS2050 2-Bay Gigabit Storage System Chassis with Two 250-Gigabyte Hard Disk Drives Cisco
Deep Dive: Maximizing EC2 & EBS Performance
Deep Dive: Maximizing EC2 & EBS Performance Tom Maddox, Solutions Architect 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved What we ll cover Amazon EBS overview Volumes Snapshots
Hardware Configuration Guide
Hardware Configuration Guide Contents Contents... 1 Annotation... 1 Factors to consider... 2 Machine Count... 2 Data Size... 2 Data Size Total... 2 Daily Backup Data Size... 2 Unique Data Percentage...
High Frequency Trading and NoSQL. Peter Lawrey CEO, Principal Consultant Higher Frequency Trading
High Frequency Trading and NoSQL Peter Lawrey CEO, Principal Consultant Higher Frequency Trading Agenda Who are we? Brief introduction to OpenHFT. What does a typical trading system look like What requirements
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
CONFIGURATION CONCEPTS SUN SPARC ENTERPRISE M-SERIES SERVERS. James Hsieh, Sun Systems Group. Sun BluePrints Online
SUN SPARC ENTERPRISE M-SERIES SERVERS CONFIGURATION CONCEPTS James Hsieh, Sun Systems Group Sun BluePrints Online Part No 820-7132-10 Revision 1.0, 12/17/08 Sun Microsystems, Inc. Table of Contents Introduction........................................................1
HyperQ Remote Office White Paper
HyperQ Remote Office White Paper Parsec Labs, LLC. 7101 Northland Circle North, Suite 105 Brooklyn Park, MN 55428 USA 1-763-219-8811 www.parseclabs.com [email protected] [email protected] Introduction
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Penetration Testing Windows Vista TM BitLocker TM
Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved. Trustworthy
4 Port PCI Express 2.0 SATA III 6Gbps RAID Controller Card with HyperDuo SSD Tiering
4 Port PCI Express 2.0 SATA III 6Gbps RAID Controller Card with HyperDuo SSD Tiering StarTech ID: PEXSAT34RH The PEXSAT34RH 4-Port PCI Express 2.0 SATA Controller Card with HyperDuo adds 4 AHCI SATA III
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION A DIABLO WHITE PAPER AUGUST 2014 Ricky Trigalo Director of Business Development Virtualization, Diablo Technologies
The Bus (PCI and PCI-Express)
4 Jan, 2008 The Bus (PCI and PCI-Express) The CPU, memory, disks, and all the other devices in a computer have to be able to communicate and exchange data. The technology that connects them is called the
CS252 Project An Encrypted File System using TPM
CS252 Project An Encrypted File System using TPM Steven Houston: [email protected] Thomas Kho: [email protected] May 14, 2007 Abstract We implement an encrypted file system that uses a Trusted
COS 318: Operating Systems. Storage Devices. Kai Li Computer Science Department Princeton University. (http://www.cs.princeton.edu/courses/cos318/)
COS 318: Operating Systems Storage Devices Kai Li Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Today s Topics Magnetic disks Magnetic disk performance
The IntelliMagic White Paper: Storage Performance Analysis for an IBM Storwize V7000
The IntelliMagic White Paper: Storage Performance Analysis for an IBM Storwize V7000 Summary: This document describes how to analyze performance on an IBM Storwize V7000. IntelliMagic 2012 Page 1 This
EDUCATION. PCI Express, InfiniBand and Storage Ron Emerick, Sun Microsystems Paul Millard, Xyratex Corporation
PCI Express, InfiniBand and Storage Ron Emerick, Sun Microsystems Paul Millard, Xyratex Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
Client-aware Cloud Storage
Client-aware Cloud Storage Feng Chen Computer Science & Engineering Louisiana State University Michael Mesnier Circuits & Systems Research Intel Labs Scott Hahn Circuits & Systems Research Intel Labs Cloud
Achieving Real-Time Business Solutions Using Graph Database Technology and High Performance Networks
WHITE PAPER July 2014 Achieving Real-Time Business Solutions Using Graph Database Technology and High Performance Networks Contents Executive Summary...2 Background...3 InfiniteGraph...3 High Performance
PCI Express Impact on Storage Architectures and Future Data Centers. Ron Emerick, Oracle Corporation
PCI Express Impact on Storage Architectures and Future Data Centers Ron Emerick, Oracle Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
Solid State Storage in Massive Data Environments Erik Eyberg
Solid State Storage in Massive Data Environments Erik Eyberg Senior Analyst Texas Memory Systems, Inc. Agenda Taxonomy Performance Considerations Reliability Considerations Q&A Solid State Storage Taxonomy
Fujitsu PRIMERGY BX920 S2 Dual-Socket Server
Datasheet Fujitsu PRIMERGY BX920 S2 Dual-Socket Server Blade Datasheet for Red Hat certification Universal Dual-Sockel Server Blade with high computing and I/O performance in a small form factor The PRIMERGY
SERVER CLUSTERING TECHNOLOGY & CONCEPT
SERVER CLUSTERING TECHNOLOGY & CONCEPT M00383937, Computer Network, Middlesex University, E mail: [email protected] Abstract Server Cluster is one of the clustering technologies; it is use for
Fusionstor NAS Enterprise Server and Microsoft Windows Storage Server 2003 competitive performance comparison
Fusionstor NAS Enterprise Server and Microsoft Windows Storage Server 2003 competitive performance comparison This white paper compares two important NAS operating systems and examines their performance.
How To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
Amazon Cloud Storage Options
Amazon Cloud Storage Options Table of Contents 1. Overview of AWS Storage Options 02 2. Why you should use the AWS Storage 02 3. How to get Data into the AWS.03 4. Types of AWS Storage Options.03 5. Object
AppliedMicro Trusted Management Module
AppliedMicro Trusted Management Module Majid Bemanian, Sr. Director of Marketing, Applied Micro Processor Business Unit July 12, 2011 Celebrating 20 th Anniversary of Power Architecture 1 AppliedMicro
Emerging storage and HPC technologies to accelerate big data analytics Jerome Gaysse JG Consulting
Emerging storage and HPC technologies to accelerate big data analytics Jerome Gaysse JG Consulting Introduction Big Data Analytics needs: Low latency data access Fast computing Power efficiency Latest
Speeding Up Cloud/Server Applications Using Flash Memory
Speeding Up Cloud/Server Applications Using Flash Memory Sudipta Sengupta Microsoft Research, Redmond, WA, USA Contains work that is joint with B. Debnath (Univ. of Minnesota) and J. Li (Microsoft Research,
White paper. QNAP Turbo NAS with SSD Cache
White paper QNAP Turbo NAS with SSD Cache 1 Table of Contents Introduction... 3 Audience... 3 Terminology... 3 SSD cache technology... 4 Applications and benefits... 5 Limitations... 6 Performance Test...
Gigabit Ethernet Packet Capture. User s Guide
Gigabit Ethernet Packet Capture User s Guide Copyrights Copyright 2008 CACE Technologies, Inc. All rights reserved. This document may not, in whole or part, be: copied; photocopied; reproduced; translated;
PCI Express Impact on Storage Architectures. Ron Emerick, Sun Microsystems
PCI Express Impact on Storage Architectures Ron Emerick, Sun Microsystems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN By Paul Stevens, Advantech Network security has become a concern not only for large businesses,
PSAM, NEC PCIe SSD Appliance for Microsoft SQL Server (Reference Architecture) September 11 th, 2014 NEC Corporation
PSAM, NEC PCIe SSD Appliance for Microsoft SQL Server (Reference Architecture) September 11 th, 2014 NEC Corporation 1. Overview of NEC PCIe SSD Appliance for Microsoft SQL Server Page 2 NEC Corporation
Solving I/O Bottlenecks to Enable Superior Cloud Efficiency
WHITE PAPER Solving I/O Bottlenecks to Enable Superior Cloud Efficiency Overview...1 Mellanox I/O Virtualization Features and Benefits...2 Summary...6 Overview We already have 8 or even 16 cores on one
CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global
CSCA0102 IT & Business Applications Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global Chapter 2 Data Storage Concepts System Unit The system unit
1000Mbps Ethernet Performance Test Report 2014.4
1000Mbps Ethernet Performance Test Report 2014.4 Test Setup: Test Equipment Used: Lenovo ThinkPad T420 Laptop Intel Core i5-2540m CPU - 2.60 GHz 4GB DDR3 Memory Intel 82579LM Gigabit Ethernet Adapter CentOS
Storage Class Memory and the data center of the future
IBM Almaden Research Center Storage Class Memory and the data center of the future Rich Freitas HPC System performance trends System performance requirement has historically double every 18 mo and this
PCI Express Impact on Storage Architectures and Future Data Centers
PCI Express Impact on Storage Architectures and Future Data Centers Ron Emerick, Oracle Corporation Author: Ron Emerick, Oracle Corporation SNIA Legal Notice The material contained in this tutorial is
Cisco Small Business NSS3000 Series Network Storage System
Cisco Small Business NSS3000 Series Network Storage System Cisco NSS3000 4-Bay Gigabit Storage System Chassis As small companies move from paper-based processes to digital applications, they become more
Computer Organization. and Instruction Execution. August 22
Computer Organization and Instruction Execution August 22 CSC201 Section 002 Fall, 2000 The Main Parts of a Computer CSC201 Section Copyright 2000, Douglas Reeves 2 I/O and Storage Devices (lots of devices,
PCI Express SATA III RAID Controller Card with Mini-SAS Connector (SFF-8087) - HyperDuo SSD Tiering
PCI Express SATA III RAID Controller Card with Mini-SAS Connector (SFF-8087) - HyperDuo SSD Tiering StarTech ID: PEXSAT34SFF The PEXSAT34SFF PCI Express 2.0 SATA Controller Card enables 4 AHCI SATA III
Software Environment. Options. Service guarantee:. 24/7 Hardware Support. 99% uptime
Hosting : VPS 35 Service Specifications 35GB of Disk Space 2GB of RAM 100GB of Bandwidth 1 IP Address Included Hardware Specifications CPU: Xeon Lynnfield Quad-Core X3430 2.4GHz Hard drives: 2 x SAS SATA
IT of SPIM Data Storage and Compression. EMBO Course - August 27th! Jeff Oegema, Peter Steinbach, Oscar Gonzalez
IT of SPIM Data Storage and Compression EMBO Course - August 27th Jeff Oegema, Peter Steinbach, Oscar Gonzalez 1 Talk Outline Introduction and the IT Team SPIM Data Flow Capture, Compression, and the Data
Architecting High-Speed Data Streaming Systems. Sujit Basu
Architecting High-Speed Data Streaming Systems Sujit Basu stream ing [stree-ming] verb 1. The act of transferring data to or from an instrument at a rate high enough to sustain continuous acquisition or
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
Board Notes on Virtual Memory
Board Notes on Virtual Memory Part A: Why Virtual Memory? - Letʼs user program size exceed the size of the physical address space - Supports protection o Donʼt know which program might share memory at
