Skip to main content

Memory Confidentiality and Integrity Protection Technology

  • Conference paper
  • First Online:
Communications, Signal Processing, and Systems (CSPS 2018)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 517))

  • 2350 Accesses

Abstract

In most existing computer systems, data transmission and preservation in the form of plaintext are vulnerable to various attacks. In this paper, we use Parralelized memory Confidentiality and Integrity Protection technology (PCIP) algorithm to ensure the confidentiality and integrity of memory data. On the basis of PCIP, we use PCIP Bonsai Merkle Tree (PCIP+BMT) to protect the counter values of off-chip to reduce system delay and overhead. PCIP is that uses counter mode encryption to encrypt data while adding redundant data for integrity checking. Finally, we use the SimpleScalar Tool to simulate the PCIP and PE-ICE algorithms. The results show that PCIP is encrypted more effectively than the PC-ICE. Compared with the Hash algorithm, it can reduce the system delay and reduce the internal memory overhead. The tree mechanism adopted in this paper reduces the impact on system performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, X., Shang, T., Kim, I., et al.: A remote data integrity checking scheme for big data storage. In: IEEE Second International Conference on Data Science in Cyberspace, pp. 53–59. IEEE (2017)

    Google Scholar 

  2. Patrick, C., Jiawen, Z., James, G., et al.: Protecting data on smartphones and tablets from memory attacks. Twent. Int. Conf. Archit. Supp. Progr. Lang. Oper. Syst. 50(4), 177–189 (2015)

    Google Scholar 

  3. Rejani, R., Murugan, D., Krishnan, V.: Digital data protection using steganography. ICTACT J. Commun. Technol. 7(1), 1245–1254 (2016)

    Google Scholar 

  4. Abdellatif, K.M., Chotin, A.R., Mehrez, H.: AES-GCM and AEGIS: efficient and high speed hardware implementations. J. Sig. Process. Syst. 88(1), 1–12 (2017)

    Article  Google Scholar 

  5. Ueno, R., Morioka, S., Homma, N., et al.: A high throughput/gate AES hardware architecture by compressing encryption and decryption datapaths. In: International Conference on Cryptographic Hardware and Embedded Systems, pp. 538–558. Springer, Berlin, Heidelberg (2016)

    Google Scholar 

  6. Wen, W., Jun, Y., Youtao, Z.: Optimizing power efficiency for 3D stacked GPU-in-memory architecture. Microprocess. Microsyst. 49, 44–53 (2017)

    Article  Google Scholar 

  7. Mohan, P., Chelliah, S., Li, Y.: An authentication technique for accessing de-duplicated data from private cloud using one time password. Int. J. Inf. Secur. Priv. 11(2), 1–10 (2017)

    Article  Google Scholar 

  8. Rasjid, Z.E., Soewito, B., Witjaksono, G., et al.: A review of collisions in cryptographic hash function used in digital forensic tools. Procedia Comput. Sci. 116, 381–392 (2017)

    Article  Google Scholar 

  9. Elbaz, R., Torres, L., Sassatelli, G., et al.: Block-level added redundancy explicit authentication for parallelized encryption and integrity checking of processor-memory transactions. Trans. Comp. Sci. X 10, 231–260 (2011)

    Google Scholar 

  10. Chen, C.: QR code authentication with embedded message authentication code. Mob. Netw. Appl. 22(3), 1–12 (2016)

    Google Scholar 

  11. Suh, G.E, Fletcher, C., Clarke, D., et al.: Author retrospective AEGIS. In: Anniversary International Conference, pp. 8–70 (2014)

    Google Scholar 

  12. Garg, N., Bawa, S.: RITS-MHT: relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing. J. Netw. Comput. Appl. 84, 1–13 (2017)

    Article  Google Scholar 

  13. Elbaz, R., Torres, L., Sassatelli, G., et al.: A parallelized way to provide data encryption and integrity checking on a processor-memory bus. In: Design Automation Conference, pp. 506–509. ACM (2006)

    Google Scholar 

  14. Mohanraj, V., Srinivasan, S.: Development of advanced encryption standard architecture with sbox parity. Walailak J. Sci. Technol. 14(4), 315–325 (2017)

    Google Scholar 

  15. Kermani, M.M., Jalali, A., Azarderakhsh, R., et al.: Reliable inversion in GF(28) with redundant arithmetic for secure error detection of cryptographic architectures. IEEE Trans. Comput.-Aided Des. Integr. Circ. Syst. PP(99), 1–1 (2017)

    Google Scholar 

  16. Sharma, N.A., Farik, M.: A performance test on symmetric encryption algorithms—RC2 Vs Rijndael. Int. J. Sci. Technol. Res. 6(7), 292–294 (2017)

    Google Scholar 

  17. Simplescalar. http://www.simplescalar.com/

  18. Arora, H., Bhatia, U., Pandita, S.: Comparative study of different cache models on SimpleScalar architecture. In: Communication and Computing, pp. 302–304. IET (2015)

    Google Scholar 

  19. SPEC 2000. http://www.spec.org/cpu2000/

  20. Uddin, I.: One-IPC high-level simulation of microthreaded many-core architectures. J. Syst. Architect. 60(7), 529–552 (2014)

    Article  Google Scholar 

  21. Zhang, W., Ji, X., Lu, Y., et al.: Prophet: a parallel instruction-oriented many-core simulator. IEEE Trans. Parall. Distrib. Syst. PP(99), 1–1 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huimin Meng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, H., Meng, H., Yao, N., Cheng, Y. (2020). Memory Confidentiality and Integrity Protection Technology. In: Liang, Q., Liu, X., Na, Z., Wang, W., Mu, J., Zhang, B. (eds) Communications, Signal Processing, and Systems. CSPS 2018. Lecture Notes in Electrical Engineering, vol 517. Springer, Singapore. https://doi.org/10.1007/978-981-13-6508-9_130

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6508-9_130

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6507-2

  • Online ISBN: 978-981-13-6508-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics