Is End-to-End Integrity Verification Really End- to-End? Ahmed - - PowerPoint PPT Presentation

is end to end integrity verification really end to end
SMART_READER_LITE
LIVE PREVIEW

Is End-to-End Integrity Verification Really End- to-End? Ahmed - - PowerPoint PPT Presentation

Is End-to-End Integrity Verification Really End- to-End? Ahmed Alhussen, Batyr Charyyev, and Engin Arslan Whats End-to-End Integrity Verification Data corruption may occur during transfers Faulty equipment, transient errors etc.


slide-1
SLIDE 1

Is End-to-End Integrity Verification Really End- to-End?

Ahmed Alhussen, Batyr Charyyev, and Engin Arslan

slide-2
SLIDE 2

What’s End-to-End Integrity Verification

  • Data corruption may occur during transfers

– Faulty equipment, transient errors etc.

  • Existing integrity check mechanisms are weak

– TCP checksum fails to once in every 16 million to 10 billion packets

  • End-to-end integrity verification offers strong fault-

tolerance guarantee

– Secure hash algorithms SHA1, SHA-254 – Captures errors that could happen anywhere during transfers; network, server, and disk (?)

slide-3
SLIDE 3

How End-to-End Integrity Verification Works?

Sender Receiver Read the file and send Receive the file and save

slide-4
SLIDE 4

How End-to-End Integrity Verification Works?

Sender Receiver Read the file and send Receive the file and save Read the file again and compute checksum Read file back from storage and compute checksum

slide-5
SLIDE 5

How End-to-End Integrity Verification Works?

Sender Receiver Read the file and send Receive the file and save Read the file again and compute checksum Read file back from storage and compute checksum Accept receiver’s checksum Send checksum

slide-6
SLIDE 6

How End-to-End Integrity Verification Works?

Sender Receiver Read the file and send Receive the file and save Read the file again and compute checksum Read file back from storage and compute checksum Accept receiver’s checksum Send checksum If checksums match Done

slide-7
SLIDE 7

How End-to-End Integrity Verification Works?

Sender Receiver Read the file and send Receive the file and save Read the file again and compute checksum Read file back from storage and compute checksum Accept receiver’s checksum Send checksum If checksums match Done Else Transfer again

slide-8
SLIDE 8

Are Disk Write Errors Captured?

Potential weakness to detect disk write errors!

100% cache hit!

slide-9
SLIDE 9

Testing Integrity Verification Against Faults

  • Four files 1-5 GB and one file 24 GB. Memory size is 20 GB
  • One fault injected for each file during disk write
  • Traditional approach failed to catch 4 out of 5 faults!
slide-10
SLIDE 10

Proposed Solution

  • Secure Integrity Verification Algorithm (SIVA)

– Delay checksum computation to let kernel remove files from cache – Ensures that files are read from disk

slide-11
SLIDE 11

Proposed Solution

  • Secure Integrity Verification Algorithm (SIVA)

– Delay checksum computation to let kernel remove files from cache – Ensures that files are read from disk

slide-12
SLIDE 12

Future Work

  • SIVA leads to ~4% cache hits. Can we reduce it even

lower to avoid missing any disk corruptions?

  • Delaying checksum incurs execution time overhead in

return of stronger fault tolerance. How to optimize execution time without sacrificing accuracy?

  • Explore ways to detect file cache removal to start

checksum earlier

slide-13
SLIDE 13

Questions?