Evaluating encryption algorithms for sensitive data using different storage devices

No Thumbnail Available
Supplementary material
Other Title
Authors
Sarrafpour, Bahman
Alkorbi, Mohammed
Jamil, N.
Asif Naeem, M.
Mirza, F.
Author ORCID Profiles (clickable)
Degree
Grantor
Date
2020-05-20
Supervisors
Type
Journal Article
Ngā Upoko Tukutuku (Māori subject headings)
Keyword
encryption algorithms
symmetric encryption algorithms
storage encryption software
Advanced Encryption Standard (AES) algorithm
storage devices
ANZSRC Field of Research Code (2020)
Citation
Sassani, B. A., Alkorbi, M., Jamil, N., Asif Naeem, M., & Mirza, F. (2020). Evaluating Encryption Algorithms for Sensitive Data Using Different Storage Devices. Scientific Programming, Volume 2020 |Article ID 6132312 | 9 pages, 9. doi:10.1155/2020/6132312
Abstract
Sensitive data need to be protected from being stolen and read by unauthorized persons regardless of whether the data are stored in hard drives, flash memory, laptops, desktops, and other storage devices. In an enterprise environment where sensitive data is stored on storage devices, such as financial or military data, encryption is used in the storage device to ensure data confidentiality. Nowadays, the SSD-based NAND storage devices are favored over HDD and SSHD to store data because they offer increased performance and reduced access latency to the client. In this paper, the performance of different symmetric encryption algorithms is evaluated on HDD, SSHD, and SSD-based NAND MLC flash memory using two different storage encryption software. Based on the experiments we carried out, Advanced Encryption Standard (AES) algorithm on HDD outperforms Serpent and Twofish algorithms in terms of random read speed and write speed (both sequentially and randomly), whereas Twofish algorithm is slightly faster than AES in sequential reading on SSHD and SSD-based NAND MLC flash memory. By conducting full range of evaluative tests across HDD, SSHD, and SSD, our experimental results can give better idea for the storage consumers to determine which kind of storage device and encryption algorithm is suitable for their purposes. This will give them an opportunity to continuously achieve the best performance of the storage device and secure their sensitive data.
Publisher
Hindawi
Link to ePress publication
DOI
https://doi.org/10.1155/2020/6132312
Copyright holder
Copyright © 2020 Bahman A. Sassani (Sarrafpour) et al
Copyright notice
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Copyright license
This item appears in: