Show simple record

dc.contributor.authorSarrafpour, Bahman
dc.contributor.authorAlkorbi, Mohammed
dc.contributor.authorJamil, N.
dc.contributor.authorAsif Naeem, M.
dc.contributor.authorMirza, F.
dc.date.accessioned2020-06-18T19:18:07Z
dc.date.available2020-06-18T19:18:07Z
dc.date.issued2020-05-20
dc.identifier.issn1058-9244
dc.identifier.issn1875-919X
dc.identifier.urihttps://hdl.handle.net/10652/4942
dc.description.abstractSensitive data need to be protected from being stolen and read by unauthorized persons regardless of whether the data are stored in hard drives, flash memory, laptops, desktops, and other storage devices. In an enterprise environment where sensitive data is stored on storage devices, such as financial or military data, encryption is used in the storage device to ensure data confidentiality. Nowadays, the SSD-based NAND storage devices are favored over HDD and SSHD to store data because they offer increased performance and reduced access latency to the client. In this paper, the performance of different symmetric encryption algorithms is evaluated on HDD, SSHD, and SSD-based NAND MLC flash memory using two different storage encryption software. Based on the experiments we carried out, Advanced Encryption Standard (AES) algorithm on HDD outperforms Serpent and Twofish algorithms in terms of random read speed and write speed (both sequentially and randomly), whereas Twofish algorithm is slightly faster than AES in sequential reading on SSHD and SSD-based NAND MLC flash memory. By conducting full range of evaluative tests across HDD, SSHD, and SSD, our experimental results can give better idea for the storage consumers to determine which kind of storage device and encryption algorithm is suitable for their purposes. This will give them an opportunity to continuously achieve the best performance of the storage device and secure their sensitive data.en_NZ
dc.language.isoenen_NZ
dc.publisherHindawien_NZ
dc.relation.urihttps://www.hindawi.com/journals/sp/2020/6132312/en_NZ
dc.rightsThis is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.en_NZ
dc.subjectencryption algorithmsen_NZ
dc.subjectsymmetric encryption algorithmsen_NZ
dc.subjectstorage encryption softwareen_NZ
dc.subjectAdvanced Encryption Standard (AES) algorithmen_NZ
dc.subjectstorage devicesen_NZ
dc.titleEvaluating encryption algorithms for sensitive data using different storage devicesen_NZ
dc.typeJournal Articleen_NZ
dc.date.updated2020-06-04T14:30:03Z
dc.rights.holderCopyright © 2020 Bahman A. Sassani (Sarrafpour) et alen_NZ
dc.identifier.doihttps://doi.org/10.1155/2020/6132312en_NZ
dc.subject.marsden080402 Data Encryptionen_NZ
dc.subject.marsden080303 Computer System Securityen_NZ
dc.identifier.bibliographicCitationSassani, B. A., Alkorbi, M., Jamil, N., Asif Naeem, M., & Mirza, F. (2020). Evaluating Encryption Algorithms for Sensitive Data Using Different Storage Devices. Scientific Programming, Volume 2020 |Article ID 6132312 | 9 pages, 9. doi:10.1155/2020/6132312en_NZ
unitec.publication.spage9en_NZ
unitec.publication.volumeVolume 2020 |Article ID 6132312 | 9 pagesen_NZ
unitec.publication.titleScentific Programmingen_NZ
unitec.peerreviewedyesen_NZ
dc.contributor.affiliationUnitec Institute of Technologyen_NZ
dc.contributor.affiliationAuckland University of Technologyen_NZ
dc.contributor.affiliationNational University of Computer & Emerging Sciences (Islamabad, Pakistan)en_NZ
unitec.identifier.roms64979en_NZ
unitec.publication.placeLondonen_NZ
unitec.institution.studyareaComputing


Files in this item

Thumbnail

This item appears in

Show simple record