• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yang Fan, Li Fei, Shu Jiwu. Survey on Secure Persistent Memory Storage[J]. Journal of Computer Research and Development, 2020, 57(5): 912-927. DOI: 10.7544/issn1000-1239.2020.20190820
Citation: Yang Fan, Li Fei, Shu Jiwu. Survey on Secure Persistent Memory Storage[J]. Journal of Computer Research and Development, 2020, 57(5): 912-927. DOI: 10.7544/issn1000-1239.2020.20190820

Survey on Secure Persistent Memory Storage

Funds: This work was supported by the National Key Research and Development Program of China (2018YFB1003301), the Key Program of the National Natural Science Foundation of China (61832011), and the Science and Technology Innovation Strategy Special Project of Guangdong Province (2018B010109002).
More Information
  • Published Date: April 30, 2020
  • With the rapid development of computer technology, computer security and data privacy protection have always been the focus of academic and industrial. By providing hardware-assisted confidentiality and integrity verification, memory security mechanism helps guarantee the security of application code and data, and prevent them from malicious memory disclosure and modification. The emerging persistent memory delivers a unique combination of affordable large capacity and support for data persistence and provides high-bandwidth and low-latency data access. It can be placed on the memory bus like DRAM and will be accessed via processor loads and stores. However, due to differences in media characteristics, DRAM-oriented memory security mechanisms cannot function efficiently on persistent memory and even have availability issues. Therefore, a secure memory storage system based on persistent memory will bring new opportunities for the secure and efficient memory storage of big data. Firstly, for the write characteristics of persistent memory, the reasons for low-efficiency in applying the security measure against traditional volatile memory to persistent memory are analyzed, and related work is expounded. Secondly, for persistent memory storage, we analyze the problems that need to be considered to ensure the security of persistent memory in its whole life cycle, and introduce research work on guaranteeing the consistency between data and corresponding metadata for security. Finally, we conclude the challenges and compare the related work in building secure memory storage based on persistent memory, and share our views on future research.
  • Related Articles

    [1]Han Bing, Wang Hao, Fang Min, Zhang Yongchao, Zhou Lu, Ge Chunpeng. Data Integrity Verification Scheme For Lightweight Devices in Cloud Storage Scenarios[J]. Journal of Computer Research and Development, 2024, 61(10): 2467-2481. DOI: 10.7544/issn1000-1239.202440489
    [2]Wei Xueliang, Yang Mingshun, Feng Dan, Liu Jingning, Wu Bing, Xiao Renzhi, Tong Wei. Coordinated Metadata Management for Secure Persistent Memory[J]. Journal of Computer Research and Development, 2022, 59(11): 2437-2450. DOI: 10.7544/issn1000-1239.20210280
    [3]Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
    [4]Cai Changxing, Du Yajuan, Zhou Taiyu. Endurance Aware Out-of-Place Update for Persistent Memory[J]. Journal of Computer Research and Development, 2022, 59(3): 553-567. DOI: 10.7544/issn1000-1239.20210541
    [5]Wang Qing, Zhu Bohong, Shu Jiwu. A Multicore-Friendly Persistent Memory Key-Value Store[J]. Journal of Computer Research and Development, 2021, 58(2): 397-405. DOI: 10.7544/issn1000-1239.2021.20200381
    [6]Chen Bo, Lu Youyou, Cai Tao, Chen Youmin, Tu Yaofeng, Shu Jiwu. A Consistency Mechanism for Distributed Persistent Memory File System[J]. Journal of Computer Research and Development, 2020, 57(3): 660-667. DOI: 10.7544/issn1000-1239.2020.20190074
    [7]Chen Youmin, Zhu Bohong, Han Yinjun, Tu Yaofeng, Shu Jiwu. A Hybrid Approach for Managing Data Pages in Persistent Memory File Systems[J]. Journal of Computer Research and Development, 2020, 57(2): 281-290. DOI: 10.7544/issn1000-1239.2020.20190574
    [8]Chen Wei, Xu Ruomei, Li Yuling. A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing[J]. Journal of Computer Research and Development, 2014, 51(12): 2585-2592. DOI: 10.7544/issn1000-1239.2014.20140666
    [9]Li Bo, Li Jianxin, Hu Chunming, Wo Tianyu, and Huai Jinpeng. Software Integrity Verification Based on VMM-Level System Call Analysis Technique[J]. Journal of Computer Research and Development, 2011, 48(8): 1438-1446.
    [10]Li Haibo, Zhan Dechen, Xu Xiaofei. Integration Verification of Workflow Business Rule Semantic[J]. Journal of Computer Research and Development, 2009, 46(7): 1143-1151.
  • Cited by

    Periodical cited type(3)

    1. 刘辉,李亮,李莉,卢钰新. 一种可回溯的缓存数据存储方法. 信息技术与信息化. 2023(08): 99-101+105 .
    2. 丁建立,李慧. 基于持久性内存的民航重复数据删除方法. 现代电子技术. 2022(10): 131-136 .
    3. 魏学亮,杨明顺,冯丹,刘景宁,吴兵,肖仁智,童薇. 面向安全持久性内存的元数据协同管理方法. 计算机研究与发展. 2022(11): 2437-2450 . 本站查看

    Other cited types(14)

Catalog

    Article views (1959) PDF downloads (651) Cited by(17)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return