Rethinking Block Storage Encryption with Virtual Disks

05/31/2022
by   Danny Harnik, et al.
0

Disk encryption today uses standard encryption methods that are length preserving and do not require storing any additional information with an encrypted disk sector. This significantly simplifies disk encryption management as the disk mapping does not change with encryption. On the other hand, it forces the encryption to be deterministic when data is being overwritten and it disallows integrity mechanisms, thus lowering security guarantees. Moreover, because the most widely used standard encryption methods (like AES-XTS) work at small sub-blocks of no more than 32 bytes, deterministic overwrites form an even greater security risk. Overall, today's standard practice forfeits some security for ease of management and performance considerations. This shortcoming is further amplified in a virtual disk setting that supports versioning and snapshots so that overwritten data remains accessible. In this work, we address these concerns and stipulate that especially with virtual disks, there is motivation and potential to improve security at the expense of a small performance overhead. Specifically, adding per-sector metadata to a virtual disk allows running encryption with a random initialization vector (IV) as well as potentially adding integrity mechanisms. We explore how best to implement additional per-sector information in Ceph RBD, a popular open-source distributed block storage with client-side encryption. We implement and evaluate several approaches and show that one can run AES-XTS encryption with a random IV at a manageable overhead ranging from 1%–22%, depending on the IO size.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/17/2022

Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks

The security of learnable image encryption schemes for image classificat...
research
08/07/2018

Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks

Encryption-then-Compression (EtC) systems have been considered for the u...
research
07/01/2018

Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version

Full Disk Encryption (FDE) has become a widely used security feature. Al...
research
05/14/2019

Non-malleability for quantum public-key encryption

Non-malleability is an important security property for public-key encryp...
research
10/15/2020

Fully Homomorphic Encryption via Affine Automorphisms

Homomorphic encryption is a method used in cryptopgraphy to create progr...
research
06/28/2018

Securing the Storage Data Path with SGX Enclaves

We explore the use of SGX enclaves as a means to improve the security of...
research
04/08/2021

Security, Performance and Energy Implications of Hardware-assisted Memory Protection Mechanisms on Event-based Streaming Systems

Major cloud providers such as Amazon, Google and Microsoft provide nowad...

Please sign up or login with your details

Forgot password? Click here to reset