Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such as passwords and keys can be extracted....
详细信息
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such as passwords and keys can be extracted. Main memory persistence will soon be the norm as recent advancements in MRAM and FeRAM position non-volatile memory technologies for widespread deployment in laptop, desktop, and embedded system main memory. Unfortunately, the same properties that provide energy efficiency, tolerance against power failure, and "instant-on'' power-up also subject systems to offline memory scanning. In this paper, we propose a memory encryption control unit (MECU) that provides memory confidentiality during system suspend and across reboots. The MECU encrypts all memory transfers between the processor-local level 2 cache and main memory to ensure plaintext data is never written to the persistent medium. The MECU design is outlined and performance and security trade-offs considered. We evaluate a MECU-enhanced architecture using the SimpleScalar hardware simulation framework on several hardware benchmarks. This analysis shows the majority of memory accesses are delayed by less than 1 ns, with higher access latencies (caused by resume state reconstruction) subsiding within 0.25 seconds of a system resume. In effect, the MECU provides zero-cost steady state memory confidentiality for non-volatile main memory.
Now-a-days, many high-end applications are turning to grid computing to meet their computational and data storage needs. High-end applications require a wide variety of computational resources as well as long time to ...
详细信息
Now-a-days, many high-end applications are turning to grid computing to meet their computational and data storage needs. High-end applications require a wide variety of computational resources as well as long time to produce the desired output. These resources should be utilized efficiently and effectively for overall performance improvement. In this paper, we present an efficient resource management architecture in grid environment using grid services. The basic technique is to monitor certain values of some parameters of grid services which provide imprecise or partial state information of the services during execution time and depending on the condition values of these parameters (specified earlier at job submission), services can be stopped at any time. Thus our architecture can save a great amount of computing resources as well as time from being wasted to produce wrong output and improves overall performance by utilizing available resources to run other services. Our proposed framework can also cope with the real- time applications. Experiment result shows that our architecture efficiently manages the computing resources and significantly saves valuable time.
Signcryption is a public key cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overheads than the signature-then-encryptio...
详细信息
Signcryption is a public key cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overheads than the signature-then-encryption approach. In this paper, an efficient certificate-based signcryption scheme based on bilinear pairings is proposed. As compared to traditional and identity-based signcryption schemes, the proposed scheme has the following advantages: it provides implicit certification;it does not have the private key escrow feature of identity-based signcryption schemes, we also analyze the proposed scheme from security and performance points of view.
A (t, n) threshold proxy signcryption scheme allows t or more proxy signcrypters from a designated group of n proxy signcrypters to signcrypt messages on behalf of an original signcrypter. In this paper, a new identit...
详细信息
This paper studies video multicasting in large scale areas using wireless mesh networks. The focus is on the use of internet access gateways that allow a choice of alternative routes to avoid potentially lengthy multi...
详细信息
This paper studies video multicasting in large scale areas using wireless mesh networks. The focus is on the use of internet access gateways that allow a choice of alternative routes to avoid potentially lengthy multi-hop wireless paths with low capacity. A set of heuristic-based algorithms are described that together aim to maximize network capacity: the two-tier integrated architecture algorithm, the weighted gateway uploading algorithm, the link-controlled routing tree algorithm, and the alternative channel assignment algorithm. These algorithms use different approaches to arrange multicast group members into a clustered and two-tier integrated architecture in which network protocols can make use of multiple gateways to improve system throughput. Simulation results are used to determine the performance of the different approaches.
Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user and object. However, current assignment schemes all...
详细信息
computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each user has many devices with their own stor...
详细信息
Intrusion detection is an efficient method against attacks in computer network and system. Most intrusion detection system for sensor networks and ad hoc networks are based on the cooperative of intrusion detection ag...
详细信息
ISBN:
(纸本)9780769530482;0769530486
Intrusion detection is an efficient method against attacks in computer network and system. Most intrusion detection system for sensor networks and ad hoc networks are based on the cooperative of intrusion detection agents and suffered from a computation and memory usage overload. In this paper, we address this problem by proposing two algorithms to optimal select and activate the intrusion detection agents for sensor networks.
暂无评论