dc.contributor.author | Sarrafpour, Bahman | |
dc.contributor.author | Alkorbi, Mohammed | |
dc.contributor.author | Jamil, N. | |
dc.contributor.author | Asif Naeem, M. | |
dc.contributor.author | Mirza, F. | |
dc.date.accessioned | 2020-06-18T19:18:07Z | |
dc.date.available | 2020-06-18T19:18:07Z | |
dc.date.issued | 2020-05-20 | |
dc.identifier.issn | 1058-9244 | |
dc.identifier.issn | 1875-919X | |
dc.identifier.uri | https://hdl.handle.net/10652/4942 | |
dc.description.abstract | Sensitive data need to be protected from being stolen and read by unauthorized persons regardless of whether the data are stored in hard drives, flash memory, laptops, desktops, and other storage devices. In an enterprise environment where sensitive data is stored on storage devices, such as financial or military data, encryption is used in the storage device to ensure data confidentiality. Nowadays, the SSD-based NAND storage devices are favored over HDD and SSHD to store data because they offer increased performance and reduced access latency to the client. In this paper, the performance of different symmetric encryption algorithms is evaluated on HDD, SSHD, and SSD-based NAND MLC flash memory using two different storage encryption software. Based on the experiments we carried out, Advanced Encryption Standard (AES) algorithm on HDD outperforms Serpent and Twofish algorithms in terms of random read speed and write speed (both sequentially and randomly), whereas Twofish algorithm is slightly faster than AES in sequential reading on SSHD and SSD-based NAND MLC flash memory. By conducting full range of evaluative tests across HDD, SSHD, and SSD, our experimental results can give better idea for the storage consumers to determine which kind of storage device and encryption algorithm is suitable for their purposes. This will give them an opportunity to continuously achieve the best performance of the storage device and secure their sensitive data. | en_NZ |
dc.language.iso | en | en_NZ |
dc.publisher | Hindawi | en_NZ |
dc.relation.uri | https://www.hindawi.com/journals/sp/2020/6132312/ | en_NZ |
dc.rights | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. | en_NZ |
dc.subject | encryption algorithms | en_NZ |
dc.subject | symmetric encryption algorithms | en_NZ |
dc.subject | storage encryption software | en_NZ |
dc.subject | Advanced Encryption Standard (AES) algorithm | en_NZ |
dc.subject | storage devices | en_NZ |
dc.title | Evaluating encryption algorithms for sensitive data using different storage devices | en_NZ |
dc.type | Journal Article | en_NZ |
dc.date.updated | 2020-06-04T14:30:03Z | |
dc.rights.holder | Copyright © 2020 Bahman A. Sassani (Sarrafpour) et al | en_NZ |
dc.identifier.doi | https://doi.org/10.1155/2020/6132312 | en_NZ |
dc.subject.marsden | 080402 Data Encryption | en_NZ |
dc.subject.marsden | 080303 Computer System Security | en_NZ |
dc.identifier.bibliographicCitation | Sassani, B. A., Alkorbi, M., Jamil, N., Asif Naeem, M., & Mirza, F. (2020). Evaluating Encryption Algorithms for Sensitive Data Using Different Storage Devices. Scientific Programming, Volume 2020 |Article ID 6132312 | 9 pages, 9. doi:10.1155/2020/6132312 | en_NZ |
unitec.publication.spage | 9 | en_NZ |
unitec.publication.volume | Volume 2020 |Article ID 6132312 | 9 pages | en_NZ |
unitec.publication.title | Scentific Programming | en_NZ |
unitec.peerreviewed | yes | en_NZ |
dc.contributor.affiliation | Unitec Institute of Technology | en_NZ |
dc.contributor.affiliation | Auckland University of Technology | en_NZ |
dc.contributor.affiliation | National University of Computer & Emerging Sciences (Islamabad, Pakistan) | en_NZ |
unitec.identifier.roms | 64979 | en_NZ |
unitec.publication.place | London | en_NZ |
unitec.institution.studyarea | Computing | |