Rethinking block storage encryption with virtual disks

Danny Harnik, O. Naor, Effi Ofer, Or Ozery
{"title":"Rethinking block storage encryption with virtual disks","authors":"Danny Harnik, O. Naor, Effi Ofer, Or Ozery","doi":"10.1145/3538643.3539748","DOIUrl":null,"url":null,"abstract":"Disk encryption today uses standard encryption methods that are length preserving and do not require storing any additional information with an encrypted disk sector. This significantly simplifies disk encryption management as the disk mapping does not change with encryption. On the other hand, it forces the encryption to be deterministic when data is being overwritten and it disallows integrity mechanisms, thus lowering security guarantees. Moreover, because the most widely used standard encryption methods (like AES-XTS) work at small sub-blocks of no more than 32 bytes, deterministic overwrites form an even greater security risk. Overall, today's standard practice forfeits some security for ease of management and performance considerations. This shortcoming is further amplified in a virtual disk setting that supports versioning and snapshots so that overwritten data remains accessible. In this work, we address these concerns and stipulate that especially with virtual disks, there is motivation and potential to improve security at the expense of a small performance overhead. Specifically, adding per-sector metadata to a virtual disk allows running encryption with a random initialization vector (IV) as well as potentially adding integrity mechanisms. We explore how best to implement additional per-sector information in Ceph RBD, a popular open-source distributed block storage with client-side encryption. We implement and evaluate several approaches and show that one can run AES-XTS encryption with a random IV at a manageable overhead ranging from 1%--22%, depending on the IO size.","PeriodicalId":159120,"journal":{"name":"Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3538643.3539748","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Disk encryption today uses standard encryption methods that are length preserving and do not require storing any additional information with an encrypted disk sector. This significantly simplifies disk encryption management as the disk mapping does not change with encryption. On the other hand, it forces the encryption to be deterministic when data is being overwritten and it disallows integrity mechanisms, thus lowering security guarantees. Moreover, because the most widely used standard encryption methods (like AES-XTS) work at small sub-blocks of no more than 32 bytes, deterministic overwrites form an even greater security risk. Overall, today's standard practice forfeits some security for ease of management and performance considerations. This shortcoming is further amplified in a virtual disk setting that supports versioning and snapshots so that overwritten data remains accessible. In this work, we address these concerns and stipulate that especially with virtual disks, there is motivation and potential to improve security at the expense of a small performance overhead. Specifically, adding per-sector metadata to a virtual disk allows running encryption with a random initialization vector (IV) as well as potentially adding integrity mechanisms. We explore how best to implement additional per-sector information in Ceph RBD, a popular open-source distributed block storage with client-side encryption. We implement and evaluate several approaches and show that one can run AES-XTS encryption with a random IV at a manageable overhead ranging from 1%--22%, depending on the IO size.
重新思考虚拟磁盘块存储加密
今天的磁盘加密使用标准的加密方法,这些方法保持长度,并且不需要在加密的磁盘扇区中存储任何额外的信息。这极大地简化了磁盘加密管理,因为磁盘映射不会随着加密而改变。另一方面,当数据被覆盖时,它强制加密是确定性的,并且它不允许完整性机制,从而降低了安全性保证。此外,由于最广泛使用的标准加密方法(如AES-XTS)在不超过32字节的小子块上工作,因此确定性覆盖形成了更大的安全风险。总的来说,为了便于管理和性能考虑,今天的标准实践牺牲了一些安全性。在支持版本控制和快照的虚拟磁盘设置中,这个缺点进一步被放大,这样覆盖的数据仍然可以访问。在这项工作中,我们解决了这些问题,并规定,特别是对于虚拟磁盘,有动机和潜力以较小的性能开销为代价来提高安全性。具体来说,将每个扇区的元数据添加到虚拟磁盘允许使用随机初始化向量(IV)运行加密,并可能添加完整性机制。我们将探讨如何在Ceph RBD中最好地实现额外的每个扇区信息,Ceph RBD是一种流行的开源分布式块存储,具有客户端加密功能。我们实现并评估了几种方法,并表明可以使用随机IV运行AES-XTS加密,开销在1%- 22%之间,具体取决于IO大小。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信