Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

18
Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT

Transcript of Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Page 1: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

HashingTHEN AND NOW

MIKE SMORUL – ADAPT PROJECT

Page 2: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Commodity Storage Performance

2003 JetStor III IDE-FC62MB/s large block

2013 218MB/s workstation SSDPerc 6/MD1000, 400MB/s+

Page 3: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Chip Speed

2003: Pentium 4 3.2Ghz

2013: Core i7 Extreme3.5Ghz

Page 4: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Hashing Performance

SHA-256 HashingJava: 85MB/sCrypto++: 111-134MB/s

Real World PenaltyJava: 20-40% penalty on

slow seek disk

Page 5: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Implications

Flipped bottlenecks

Page 6: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

How to overcome

Faster/weaker digestsSimultaneous transfers

Data locality, tape?Improve single stream

performance

Page 7: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Parallelize Single Stream

Independent IO and digest threads

Always have work for the digest algorithm.

Large files saw over 95% of algorithm potential.

Small files unchanged.

Page 8: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Securing Data in Motion

?

Page 9: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Where to apply fixity

Internal integrity servicesAt Transfer via manifestsEnd to End?

Page 10: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Operational Integrity

Internal AuditingProve your hardwareError, not malice

detectionPeer-Auditing

Prove your friends

Page 11: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Transporting Integrity

Manifest ListsTransfer validation

Digital SignaturesProve identity

Token BasedProve time

Page 12: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Chronopolis Integrity

Current:Producer supplied

authoritative manifestPeers locally monitor

integrityManually trace back to

point of ingest

Page 13: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Chronopolis Integrity

In-progressSingle integrity token back

to ingestIdeal

Tokens issued prior to arrival‘Prove’ the state of data to

point before Chronopolis

Page 14: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Manifests 2.0

Beyond simple transfer listToken manifestsPortable, embeddable

Python, etc

Page 15: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Cloud Integrity

Digests in a cloud validate transfer only

Http headers can pass extended integrity informationEnd-user verification

Page 16: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Integrity as provenance

Integrity checking forward in timeConsumer level verification of

data

Integrity from object creationStart integrity checking before

archiving

Page 17: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Closing

Why are you hashing?What do you want to

prove?Hashing Cost/performance

Page 18: Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Contact

Mike Smorul

[email protected]

http://adapt.umiacs.umd.edu/ace