Skip to main content

Reducing Costs in HSM-Based Data Centers

  • Conference paper
  • First Online:
Green, Pervasive, and Cloud Computing (GPC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10232))

Included in the following conference series:

  • 1918 Accesses

Abstract

Hardware Security Modules (HSM) are special purpose devices designed for cryptographic operations, mostly used for cryptographic keys management. To achieve high security standard, an HSM stores keys internally and never exposes them in plaintext; operations involving the keys are performed internally and only the result is given outside the HSM. Thus an HSM must have storage space to store all the keys that have to be managed. In real-world application this might require a huge amount of space (e.g. millions of keys) resulting in large data centers needed to host many HSMs. Related costs, such as cost of the hardware, energy consumption, hosting, management, etc. are directly proportional to the number of HSMs used. In this paper we present a technique that allows to save space for storing keys in an HSM, thus reducing the number of needed HSMs. While saving space allows to reduce direct costs, it comes at the expense of computation time. We provide a preliminary experimental evaluation of the extra time needed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. National Institute of Standards and Technologies. Recommendation for Random Number Generation Using Deterministic Random Bit Generators. Technical report SP 800-90A Rev 1 (2015)

    Google Scholar 

  2. National Institute of Standards and Technologies. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical report SP 800-22 (2010)

    Google Scholar 

  3. Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM J. Comput. 15(2), 364–383 (1986)

    Article  MathSciNet  MATH  Google Scholar 

  4. Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudorandom bits. SIAM J. Comput. 13(4), 850–864 (1984)

    Article  MathSciNet  MATH  Google Scholar 

  5. Salvaro, T.C., Martina, J.E., Custodio, R.F.: Audit and backup procedures for hardware security modules. In proceedings of the 7th Symposium on Identity and Trust on the Internet. ACM press, pp. 89–97 (2008)

    Google Scholar 

  6. Focardi, R., Luccio, F.L.: Secure upgrade of hardware security modules in bank networks. In: Armando, A., Lowe, G. (eds.) ARSPA-WITS 2010. LNCS, vol. 6186, pp. 95–110. Springer, Heidelberg (2010). doi:10.1007/978-3-642-16074-5_7

    Chapter  Google Scholar 

  7. Katz, J., Lindell, Y.: Introduction to Modern Cryptography (Second Edition). CRC Press (2015). ISBN-13: 978-1466570269

    Google Scholar 

  8. Mavrovouniotis, S., Ganley, M.: Hardware security modules. In: Markantonakis, K., Mayes, K. (eds.) Secure Smart Embedded Devices, Platforms and Applications, pp. 383–405. Springer, New York (2014). doi:10.1007/978-1-4614-7915-4_17. ISBN 978-1-4614-7914-7. Chap. 17

    Chapter  Google Scholar 

  9. Goldrech, O., Goldwasser, S., Micali, S.: How to construct random functions. J. Assoc. Comput. Mach. 33(4), 792–807 (1986)

    Article  MathSciNet  Google Scholar 

  10. Park, S.K., Miller, K.W.: Random number generators: good ones are hard to find. Commun. ACM 31(10), 1192–1201 (1988)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

We thank the eTuitus staff, in particular Oliviero Trivellato, Pompeo Faruolo, Fabio Petagna and Maurizio Cembalo, for useful technical discussions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. De Prisco .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

De Prisco, R., De Santis, A., Mannetta, M. (2017). Reducing Costs in HSM-Based Data Centers. In: Au, M., Castiglione, A., Choo, KK., Palmieri, F., Li, KC. (eds) Green, Pervasive, and Cloud Computing. GPC 2017. Lecture Notes in Computer Science(), vol 10232. Springer, Cham. https://doi.org/10.1007/978-3-319-57186-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57186-7_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57185-0

  • Online ISBN: 978-3-319-57186-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics