Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted - - PowerPoint PPT Presentation

sego pervasive trusted metadata for efficiently verified
SMART_READER_LITE
LIVE PREVIEW

Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted - - PowerPoint PPT Presentation

Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services Youngjin Kwon , Alan Dunn, Michael Lee, Owen Hofmann, Yuanzhong Xu, Emmett Witchel 1 Securing OS is difficult OS vulnerabilities in 2014 from national


slide-1
SLIDE 1

Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services

Youngjin Kwon, Alan Dunn, Michael Lee, Owen Hofmann, Yuanzhong Xu, Emmett Witchel

1

slide-2
SLIDE 2

Securing OS is difficult

2

40 80 120 160

# of vulnerabilites # of high ranked
 vulnerabilites

Mac OS iOS Linux Kernel Window 8.1 Windows Server 2012 OS vulnerabilities in 2014

  • Large attack surfaces
  • System calls
  • Ioctl interface
  • 3rd party device

driver

from national vulnerability database (NVD)

slide-3
SLIDE 3

Securing OS is not enough

3

4% 13% 83%

Application OS Hardware

  • Getting root leads to control OS
  • Privilege escalation vulnerability
  • Many APPs run with root permission

Vulnerability distribution in 2014 from NVD

slide-4
SLIDE 4

Protecting application from malicious OS

4

Application Operating system

Read / modify code or data

  • With trusted hypervisor

Overshadow (ASPLOS 2008) TrustVisor (IEEE S&P 2010) InkTag (ASPLOS 2013) Sego (ASPLOS 2016)

  • With compiler instrumentation

VirtualGhost (ASPLOS 2014)

  • With hardware (SGX) support

Haven (OSDI 2014)

slide-5
SLIDE 5

Outline

  • Previous system
  • Sego eliminates encryption and hashing
  • Sego provides crash consistency and

recovery

  • Conclusion

5

slide-6
SLIDE 6

How do previous systems work?

6

slide-7
SLIDE 7

Trust model

7

Secure APP APP

Sego library

Guest operating system Hypervisor Hardware

Trusted Untrusted

hypercall

System overview

Sego library

  • Interpose syscall
  • cooperate with hypervisor
slide-8
SLIDE 8

Hypervisor encrypts memory for secrecy

8

RAM

APP OS Hypervisor

Software Ciphertext Plaintext

storage

slide-9
SLIDE 9

Hypervisor encrypts memory for secrecy

8

A

RAM

APP OS Hypervisor

B C

Software Ciphertext Plaintext

  • 1. APP reads/writes

memory page

storage

slide-10
SLIDE 10

Hypervisor encrypts memory for secrecy

8

A

RAM

APP OS Hypervisor

B C

Software Ciphertext Plaintext

  • 1. APP reads/writes

memory page

  • 2. OS wants to swap page

storage

slide-11
SLIDE 11

Hypervisor encrypts memory for secrecy

8

A

RAM

APP OS Hypervisor

C

Software Ciphertext Plaintext

  • 1. APP reads/writes

memory page

  • 2. OS wants to swap page
  • 3. Hypervisor blocks OS

a) Encrypts page

0110 1010

storage

slide-12
SLIDE 12

Hypervisor encrypts memory for secrecy

8

A

RAM

APP OS Hypervisor

C

Software Ciphertext Plaintext

  • 1. APP reads/writes

memory page

  • 2. OS wants to swap page
  • 3. Hypervisor blocks OS

a) Encrypts page

  • 4. OS swaps encrypted page

0110 1010

storage

slide-13
SLIDE 13

Hypervisor encrypts memory for secrecy

8

A

RAM

APP OS Hypervisor

C

Software Ciphertext Plaintext

  • 1. APP reads/writes

memory page

  • 2. OS wants to swap page
  • 3. Hypervisor blocks OS

a) Encrypts page

  • 4. OS swaps encrypted page

0110 1010

storage

slide-14
SLIDE 14

Hypervisor hashes memory for integrity

9

RAM

Ciphertext Plaintext

H Hash

Hypervisor memory Metadata Software

storage

APP OS Hypervisor

slide-15
SLIDE 15

Hypervisor hashes memory for integrity

9

A

RAM

B C

Ciphertext Plaintext

H Hash

Hypervisor memory Metadata mA mB mC

  • 1. APP reads/writes memory page

a) HYP maintains metadata Software

storage

APP OS Hypervisor

slide-16
SLIDE 16

Hypervisor hashes memory for integrity

9

A

RAM

B C

Ciphertext Plaintext

H Hash

Hypervisor memory Metadata mA mB mC

  • 1. APP reads/writes memory page

a) HYP maintains metadata

  • 2. OS wants to swap page

Software

storage

APP OS Hypervisor

slide-17
SLIDE 17

Hypervisor hashes memory for integrity

9

A

RAM

C

Ciphertext Plaintext

H Hash

Hypervisor memory Metadata mA mB mC

  • 1. APP reads/writes memory page

a) HYP maintains metadata

  • 2. OS wants to swap page
  • 3. Hypervisor blocks OS

a) Encrypts page b) Hashes page Software

storage

0110

1010

APP OS Hypervisor

slide-18
SLIDE 18

Hypervisor hashes memory for integrity

9

A

RAM

C

Ciphertext Plaintext

H Hash

Hypervisor memory Metadata mA mB mC

  • 1. APP reads/writes memory page

a) HYP maintains metadata

  • 2. OS wants to swap page
  • 3. Hypervisor blocks OS

a) Encrypts page b) Hashes page Software

storage

0110

1010

H APP OS Hypervisor

slide-19
SLIDE 19

Hypervisor hashes memory for integrity

9

A

RAM

C

Ciphertext Plaintext

H Hash

Hypervisor memory Metadata mA mB mC

  • 1. APP reads/writes memory page

a) HYP maintains metadata

  • 2. OS wants to swap page
  • 3. Hypervisor blocks OS

a) Encrypts page b) Hashes page

  • 4. OS swaps the encrypted page

Software

storage

0110

1010

H APP OS Hypervisor

slide-20
SLIDE 20

Hypervisor hashes memory for integrity

9

A

RAM

C

Ciphertext Plaintext

H Hash

Hypervisor memory Metadata mA mB mC

  • 1. APP reads/writes memory page

a) HYP maintains metadata

  • 2. OS wants to swap page
  • 3. Hypervisor blocks OS

a) Encrypts page b) Hashes page

  • 4. OS swaps the encrypted page

Software

storage

0110

1010

H APP OS Hypervisor

slide-21
SLIDE 21

Hypervisor hashes memory for integrity

9

A

RAM

C

Ciphertext Plaintext

H Hash

Hypervisor memory Metadata mA mB mC

  • 1. APP reads/writes memory page

a) HYP maintains metadata

  • 2. OS wants to swap page
  • 3. Hypervisor blocks OS

a) Encrypts page b) Hashes page

  • 4. OS swaps the encrypted page
  • 5. APP accesses page

a) OS swaps in b) HYP checks hash c) HYP decrypts page Software

storage

0110

1010

H APP OS Hypervisor

slide-22
SLIDE 22

Hypervisor hashes memory for integrity

9

A

RAM

C

Ciphertext Plaintext

H Hash

Hypervisor memory Metadata mA mB mC

  • 1. APP reads/writes memory page

a) HYP maintains metadata

  • 2. OS wants to swap page
  • 3. Hypervisor blocks OS

a) Encrypts page b) Hashes page

  • 4. OS swaps the encrypted page
  • 5. APP accesses page

a) OS swaps in b) HYP checks hash c) HYP decrypts page Software

storage

0110

1010

H APP OS Hypervisor

slide-23
SLIDE 23

Hypervisor hashes memory for integrity

9

A

RAM

C

Ciphertext Plaintext

H Hash

Hypervisor memory Metadata mA mB mC

  • 1. APP reads/writes memory page

a) HYP maintains metadata

  • 2. OS wants to swap page
  • 3. Hypervisor blocks OS

a) Encrypts page b) Hashes page

  • 4. OS swaps the encrypted page
  • 5. APP accesses page

a) OS swaps in b) HYP checks hash c) HYP decrypts page Software

storage

0110

1010

H H APP OS Hypervisor

slide-24
SLIDE 24

Hypervisor hashes memory for integrity

9

A

RAM

C

Ciphertext Plaintext

H Hash

Hypervisor memory Metadata mA mB mC

  • 1. APP reads/writes memory page

a) HYP maintains metadata

  • 2. OS wants to swap page
  • 3. Hypervisor blocks OS

a) Encrypts page b) Hashes page

  • 4. OS swaps the encrypted page
  • 5. APP accesses page

a) OS swaps in b) HYP checks hash c) HYP decrypts page Software

storage

0110

1010

H H APP OS Hypervisor

B

slide-25
SLIDE 25
  • Performance of encryption and hashing
  • AES-NI (GCM) supported in processor
  • 800MB/s - 1.2 GB/s
  • Performance of a single IO device
  • Commodity SSD : 520MB/s
  • Fusion-io ioDrive : 1GB ~ 1.5GB/s
  • IO bandwidth can overwhelm encryption bandwidth!

10

Performance cost of encryption and hashing

slide-26
SLIDE 26
  • Modern services require OS to touch memory
  • Transparent page sharing
  • Multiple virtual machines consume less memory
  • Overshadow/InkTag can not support it
  • Memory compaction
  • OS defragments memory for large pages
  • Better TLB utilization
  • We must make OS access to APP pages more efficient

11

OS Memory Services

slide-27
SLIDE 27

Sego eliminates encryption and hashing by using trusted metadata

12

slide-28
SLIDE 28

Replace encryption and hashing with hypercalls

13

APP OS Sego hypervisor

protected data Hypervisor memory Software

slide-29
SLIDE 29

Replace encryption and hashing with hypercalls

13

  • 1. APP reads/writes memory page

a) HYP maintains metadata

A

APP OS Sego hypervisor

B C

protected data Hypervisor memory mA mB mC Software

slide-30
SLIDE 30

Replace encryption and hashing with hypercalls

13

  • 1. APP reads/writes memory page

a) HYP maintains metadata

A

APP OS Sego hypervisor

B C

protected data Hypervisor memory mA mB mC Software

slide-31
SLIDE 31

Replace encryption and hashing with hypercalls

13

  • 1. APP reads/writes memory page

a) HYP maintains metadata

A

APP OS Sego hypervisor

B C

protected data Hypervisor memory mA mB mC

  • 2. OS is not allowed to access

protected memory pages

Software

slide-32
SLIDE 32

Replace encryption and hashing with hypercalls

13

  • 1. APP reads/writes memory page

a) HYP maintains metadata

  • 3. OS sends hypercall

to move memory pages

A

APP OS Sego hypervisor

B C

protected data Hypervisor memory mA mB mC

hypercall

  • 2. OS is not allowed to access

protected memory pages

Software

slide-33
SLIDE 33

Replace encryption and hashing with hypercalls

13

  • 1. APP reads/writes memory page

a) HYP maintains metadata

  • 3. OS sends hypercall

to move memory pages

  • 4. Hypervisor moves the

memory page

A

APP OS Sego hypervisor

B C

protected data Hypervisor memory mA mB mC

hypercall

  • 2. OS is not allowed to access

protected memory pages

Software

slide-34
SLIDE 34

Sego persists data with metadata

14

Hypervisor memory

APP OS Sego hypervisor Virtualized block device

  • Virtualized block device
  • Virtual hard disk/SSD
  • Sees/controls all I/O
  • Buffers guest IO in host

memory

  • Hypervisor storage
  • Invisible to OS
  • Holds trusted metadata

Hypervisor storage OS storage protected data Software

A B C

mA mB mC

C

mC

slide-35
SLIDE 35

Sego persists data with metadata

14

Hypervisor memory

APP OS Sego hypervisor Virtualized block device

  • Virtualized block device
  • Virtual hard disk/SSD
  • Sees/controls all I/O
  • Buffers guest IO in host

memory

  • Hypervisor storage
  • Invisible to OS
  • Holds trusted metadata

IO buffer Hypervisor storage OS storage protected data Software Read

A B C

mA mB mC

C

mC

slide-36
SLIDE 36

Sego persists data with metadata

14

Hypervisor memory

APP OS Sego hypervisor Virtualized block device

  • Virtualized block device
  • Virtual hard disk/SSD
  • Sees/controls all I/O
  • Buffers guest IO in host

memory

  • Hypervisor storage
  • Invisible to OS
  • Holds trusted metadata

IO buffer Hypervisor storage OS storage protected data Software Read

A B C

mA mB mC

C

mC

slide-37
SLIDE 37

Pervasive trusted metadata

15

  • Metadata is everywhere
  • To protect data in memory : hypervisor memory
  • To protect data in storage : hypervisor storage
  • Metadata is shared
  • Hypervisor and virtualized block device share

metadata

slide-38
SLIDE 38

16

Hypervisor memory

APP OS Sego hypervisor Virtualized block device

Hypervisor storage OS storage protected data Software

Sego protects data with pervasive metadata

  • Metadata in memory: for

Hypervisor protecting data

  • Metadata in storage: for

virtualized block device protecting data

A B C

mA mB mC

C

mC

slide-39
SLIDE 39

Sequential read

17

0.5 1 1.5 2

Hard disk SSD

1.26 1.17 1.53 1.93 1 1

Linux-VM InkTag Sego

  • InkTag/Overshadow
  • Protect app by encryption

and hashing

  • SSD (250MB/s)
  • 13 ~ 15% improvement by

removing encryption and hashing

  • Hard disk
  • IO batching optimization

S l

  • w

d

  • w

n b e t t e r

slide-40
SLIDE 40

OS touches protected memory

18

0.5 1 1.5 2 2.5

429.mcf 470.lbm graph analysis Micro benchmark
 (Sequential read)

1.06 1.01 1.05 1.05 1.25 1.39 1.61 2.1 1 1 1 1

Linux-VM InkTag Sego Transparent page sharing scan 100 pages at every 20 milliseconds Memory compaction

S l

  • w

d

  • w

n b e t t e r

slide-41
SLIDE 41

Sego provides crash consistency and secure recovery without trusting OS

19

Guest OS crash hypervisor, virtualized block device, and metadata are alive APP and os are dead Hypervisor crash

slide-42
SLIDE 42

Sego can’t trust OS journal

APP OS Sego hypervisor Virtualized block device

  • Modern file systems use journals
  • Journals have complex write
  • rdering and recovery

Challenges

  • Journal makes recovery easier for OS
  • But more difficult for Sego!
  • Hypervisor cannot trust OS

20

Hypervisor storage OS storage

C

mC

slide-43
SLIDE 43

File length attack

21

logical view

  • f storage

Configuration file APP OS Sego hypervisor Virtualized block device

Administrator

slide-44
SLIDE 44

File length attack

21

logical view

  • f storage

Configuration file Security setting

Correct file length

  • 1. Append and

close the file

APP OS Sego hypervisor Virtualized block device

Administrator

slide-45
SLIDE 45

File length attack

21

logical view

  • f storage

Configuration file Security setting

Correct file length

  • 1. Append and

close the file

  • 2. Open the file

APP OS Sego hypervisor Virtualized block device

Administrator

slide-46
SLIDE 46

File length attack

21

logical view

  • f storage

Configuration file Security setting

Correct file length

  • 1. Append and

close the file

  • 2. Open the file

OS tells the length of previous state

APP OS Sego hypervisor Virtualized block device

Administrator

slide-47
SLIDE 47

File length attack

21

logical view

  • f storage

Configuration file Security setting

Correct file length

  • 1. Append and

close the file

  • 2. Open the file

OS tells the length of previous state

If the APP believes the OS length, OS can do the file length attack (undo the security setting)

APP OS Sego hypervisor Virtualized block device

Administrator

slide-48
SLIDE 48

File length attack

21

logical view

  • f storage

Configuration file Security setting

Correct file length

  • 1. Append and

close the file

  • 2. Open the file

OS tells the length of previous state

If the APP believes the OS length, OS can do the file length attack (undo the security setting)

Ask the file length

APP OS Sego hypervisor Virtualized block device

Administrator

slide-49
SLIDE 49

Virtualized block device tracks file length with metadata

22

APP OS Sego hypervisor Virtualized block device

  • Pervasive metadata model
  • Metadata is shared
  • Virtualized block device
  • Tracks a maximum offset
  • Shares the file length

with hypervisor

M1 Metadata …. Offset Sector number ….

Hypervisor storage OS storage

Secure file M2 …

slide-50
SLIDE 50

Append crash scenario

Secure file APP OS Sego hypervisor Virtualized block device

23

slide-51
SLIDE 51

Append crash scenario

Secure file APP OS Sego hypervisor Virtualized block device

23

Offset 1000

slide-52
SLIDE 52

Append crash scenario

Secure file APP OS Sego hypervisor Virtualized block device

23

Offset 1000

slide-53
SLIDE 53

Append crash scenario

Secure file

Write ordering by OS file system

APP OS Sego hypervisor Virtualized block device

23

Offset 1000

slide-54
SLIDE 54

Append crash scenario

Secure file

Write ordering by OS file system Offset 1000 (Data) I-node (Journal) I-node (Data)

APP OS Sego hypervisor Virtualized block device

23

Offset 1000

slide-55
SLIDE 55

Append crash scenario

Secure file

Write ordering by OS file system Offset 1000 (Data) I-node (Journal) I-node (Data)

APP OS Sego hypervisor Virtualized block device

Journaling filesystem discards the write during recovery

23

Offset 1000

slide-56
SLIDE 56

Append crash scenario

Secure file

Write ordering by OS file system Offset 1000 (Data) I-node (Journal) I-node (Data)

APP OS Sego hypervisor Virtualized block device

Journaling filesystem discards the write during recovery

23

Offset 1000 Offset 1000 Offset 1000 Discarded block

Data is persisted OS I-node has stale length

slide-57
SLIDE 57

Journal file system creates inconsistency problem

24

Secure file Offset 1000 Offset 1000 APP OS Sego hypervisor Virtualized block device

slide-58
SLIDE 58

Journal file system creates inconsistency problem

24

Secure file Offset 1000 Offset 1000 APP OS Sego hypervisor Virtualized block device

Hypervisor’s length OS’s length

slide-59
SLIDE 59

Journal file system creates inconsistency problem

24

Secure file Offset 1000 Offset 1000 APP OS Sego hypervisor Virtualized block device

Hypervisor’s length OS’s length

Ask the file length

slide-60
SLIDE 60

Journal file system creates inconsistency problem

24

Secure file Offset 1000 Offset 1000 APP OS Sego hypervisor Virtualized block device

Hypervisor’s length OS’s length

Ask the file length

Read offset 1000

slide-61
SLIDE 61

Journal file system creates inconsistency problem

24

Secure file Offset 1000 Offset 1000 APP OS Sego hypervisor Virtualized block device

Hypervisor’s length OS’s length

OS is not able to locate offset 1000

Ask the file length

Read offset 1000

APP cannot progress

slide-62
SLIDE 62

Sego cannot trust journal file system

25

Secure file Offset 1000 Offset 1000

hypervisor’s length OS’s length

  • This OS recovery is legal
  • Hypervisor cannot trust it
  • Legal or malicious?
  • If APP believes OS’s length
  • OS can use this crash for the file

length attack

  • If APP believes hypervisor’s length
  • APP cannot progress in legal

recovery case

slide-63
SLIDE 63

Sego recovers secure file with metadata

26

APP OS Sego hypervisor Virtualized block device Sego library Secure file Offset 1000

Hypervisor’s length OS’s length

Recovery procedure

Metadata … Offset Sector number …. Offset 1000

slide-64
SLIDE 64

Sego recovers secure file with metadata

26

APP OS Sego hypervisor Virtualized block device Sego library Secure file Offset 1000

Hypervisor’s length OS’s length

Recovery procedure

Metadata … Offset Sector number ….

APP Opens the file LIB Get OS length

Offset 1000

slide-65
SLIDE 65

Sego recovers secure file with metadata

26

APP OS Sego hypervisor Virtualized block device Sego library Secure file Offset 1000

Hypervisor’s length OS’s length

Recovery procedure

Metadata … Offset Sector number ….

APP Opens the file LIB Get OS length LIB Give OS length to Sego hypervisor

Offset 1000

slide-66
SLIDE 66

Sego recovers secure file with metadata

26

APP OS Sego hypervisor Virtualized block device Sego library Secure file Offset 1000

Hypervisor’s length OS’s length

Recovery procedure

Metadata … Offset Sector number ….

APP Opens the file LIB Get OS length LIB Give OS length to Sego hypervisor

Offset 1000 Length mismatch

slide-67
SLIDE 67

Sego recovers secure file with metadata

26

APP OS Sego hypervisor Virtualized block device Sego library Secure file Offset 1000

Hypervisor’s length OS’s length

Recovery procedure

Metadata … Offset Sector number ….

APP Opens the file LIB Get OS length LIB Give OS length to Sego hypervisor HYP Requests recovery of offset 1000

Offset 1000 Length mismatch

slide-68
SLIDE 68

Sego recovers secure file with metadata

26

APP OS Sego hypervisor Virtualized block device Sego library Secure file Offset 1000

Hypervisor’s length OS’s length

Recovery procedure

Metadata … Offset Sector number ….

APP Opens the file LIB Get OS length LIB Give OS length to Sego hypervisor HYP Requests recovery of offset 1000 Virtualized block device Read the data by looking up metadata

Offset 1000 Length mismatch

slide-69
SLIDE 69

Sego recovers secure file with metadata

26

APP OS Sego hypervisor Virtualized block device Sego library Secure file Offset 1000

Hypervisor’s length OS’s length

Recovery procedure

Metadata … Offset Sector number ….

Copies the offset 1000 to the library APP Opens the file LIB Get OS length LIB Give OS length to Sego hypervisor HYP Requests recovery of offset 1000 Virtualized block device Read the data by looking up metadata

Offset 1000 Length mismatch

slide-70
SLIDE 70

Sego recovers secure file with metadata

26

APP OS Sego hypervisor Virtualized block device Sego library Secure file Offset 1000

Hypervisor’s length OS’s length

Recovery procedure

Metadata … Offset Sector number ….

Copies the offset 1000 to the library APP Opens the file LIB Get OS length LIB Give OS length to Sego hypervisor HYP Requests recovery of offset 1000 Virtualized block device Read the data by looking up metadata

Offset 1000 Length mismatch

slide-71
SLIDE 71

Sego recovers secure file with metadata

26

APP OS Sego hypervisor Virtualized block device Sego library Secure file Offset 1000

Hypervisor’s length OS’s length

Recovery procedure

Metadata … Offset Sector number ….

Copies the offset 1000 to the library APP Opens the file LIB Get OS length LIB Give OS length to Sego hypervisor HYP Requests recovery of offset 1000 Virtualized block device Read the data by looking up metadata

Offset 1000 Length mismatch

slide-72
SLIDE 72

Sego recovers secure file with metadata

26

APP OS Sego hypervisor Virtualized block device Sego library Secure file Offset 1000

Hypervisor’s length OS’s length

Recovery procedure

Metadata … Offset Sector number ….

Copies the offset 1000 to the library APP Opens the file LIB Get OS length LIB Give OS length to Sego hypervisor HYP Requests recovery of offset 1000 Virtualized block device Read the data by looking up metadata

Offset 1000 Length mismatch

slide-73
SLIDE 73

Other crash cases

27

Recovery target Inconsistency Detection File creation File is created in hypervisor but not in OS When the APP

  • pens the file

File length File length of hypervisor and OS is different When OS reboots from crash Data recovery Hypervisor loses blocks because OS discards them When the APP

  • pens the file

Block commit (hypervisor crash) Block write might not be committed in virtual block device Hypervisor runs FSCK Crash while recovery One of the above Hypervisor runs FSCK

slide-74
SLIDE 74

Fault injection

  • Fault injector
  • Modify previous framework for modern OS
  • Nooks (Swift et al., SOSP 2003)
  • Rio file cache (Chen et al., ASPLOS 1996)
  • Fault distribution is based on real-world fault

study

  • An empirical study of operating system error (SOSP 2001)
  • Faults in linux: Ten years later (ASPLOS 2011)
  • A study of linux file system evolution (FAST 2013)

28

slide-75
SLIDE 75

Crash recovery experiment

  • Experiment
  • 4 processes write each secure

file and verify them

  • Git : add files (20MB), sync, and

add files (30MB).

  • 20 randomly selected faults are

injected

29

recovery 4 writing processes Git No crash 51 (51%) 114 (76%) File creation 40 (40%) 29 (19%) File length 2 (2%) 7 (5%) Data Recovery 1 (1%)

Sego correctly recovers every case Without Sego’s recovery Application keeps crashing

slide-76
SLIDE 76

Sego overhead

30

Benchmark Slowdown to Linux-VM OpenLDAP

Insert (15.9%), Query (3.6%), Delete (15.0%)

Apache Throughput (7.5%), Latency (8.2%) Grep Small file (10.1%), Large file (8.3%) DokuWiki 90/10 read/write web pages (49%)

slide-77
SLIDE 77

Conclusions

  • Sego proposes the pervasive metadata model for
  • eliminating encryption and hashing for

performance without losing security guarantees

  • detecting file system inconsistencies and

recovery from crashes

  • We hope the trusted metadata model will be

adapted to device virtualization

31

slide-78
SLIDE 78

Questions?

32

Fault injector - https://github.com/ut-osa/fault-injection