Write-ahead log and data encryption technologies are employed to ensure both crash consistency and data security for persistent memory (PM). The encryption/decryption of both data and log requests increase the memory request latency, degrading the system performance. To tackle this issue, this paper proposes a novel log-aware memory encryption scheme to reduce encryption/decryption operations, without compromising data security. Specifically, redo log blocks are stored as ciphertext for their corresponding data blocks to avoid encryption/decryption of log data blocks when in-place update operations are applied to them. We further design a compact log record layout with fewer encryption metadata in log records to reduce logging traffic. Our ...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...
This study presents an efficient persistent memory encryption mechanism, named Crystalor, which effi...
Datacenter operators have started deploying Persistent Memory (PM), leveraging its combination of fa...
The persistent memory (PM) requires maintaining the crash consistency and encrypting data, to ensure...
While logging has been adopted in persistent memory (PM) to support crash consistency, logging incur...
Persistent key-value stores (KVSs) are fundamental building blocks of modern software products. A KV...
This paper proposes a hardware transactional memory (HTM) system called LogTM Signature Edition (Log...
This paper proposes a hardware transactional memory (HTM) system called LogTM Signature Edition (Log...
Non-volatile memory (NVM) technologies such as PCM, ReRAM and STT-RAM allow processors to directly w...
Abstract: Key-value store is an essential component with an increasing demand in many scale-out env...
Secure deletion is the task of deleting data irrecoverably from a physical medium. In this work, we ...
Due to their high-density and near-zero leakage power consumption, non-volatile memories (NVMs) are ...
Auditing system logs is an important means of ensuring systems' security in situations where run-tim...
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, bank...
Nonvolatile memory (e.g., Phase Change Memory) blurs the boundary between memory and storage and it ...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...
This study presents an efficient persistent memory encryption mechanism, named Crystalor, which effi...
Datacenter operators have started deploying Persistent Memory (PM), leveraging its combination of fa...
The persistent memory (PM) requires maintaining the crash consistency and encrypting data, to ensure...
While logging has been adopted in persistent memory (PM) to support crash consistency, logging incur...
Persistent key-value stores (KVSs) are fundamental building blocks of modern software products. A KV...
This paper proposes a hardware transactional memory (HTM) system called LogTM Signature Edition (Log...
This paper proposes a hardware transactional memory (HTM) system called LogTM Signature Edition (Log...
Non-volatile memory (NVM) technologies such as PCM, ReRAM and STT-RAM allow processors to directly w...
Abstract: Key-value store is an essential component with an increasing demand in many scale-out env...
Secure deletion is the task of deleting data irrecoverably from a physical medium. In this work, we ...
Due to their high-density and near-zero leakage power consumption, non-volatile memories (NVMs) are ...
Auditing system logs is an important means of ensuring systems' security in situations where run-tim...
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, bank...
Nonvolatile memory (e.g., Phase Change Memory) blurs the boundary between memory and storage and it ...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion ...
This study presents an efficient persistent memory encryption mechanism, named Crystalor, which effi...
Datacenter operators have started deploying Persistent Memory (PM), leveraging its combination of fa...