Object-oriented Unified Encrypted Memory Management for Heterogeneous Memory Architectures 155:3
tier—a compromise in a single tier could jeopardize the robustness of the entire system. Therefore,
it is essential to have a deep understanding and eective incorporation of this characteristic to
enhance data security during interactions among tiers with disparate levels of security strength.
Second, eectively deploying proactive security solutions is challenging, especially in the context
of methodologies based on specic benign conditions. This is because the subordinate memory
tier within a heterogeneous memory framework often lacks the capacity to maintain any security
assumptions. It is dicult to both reliably ascertain its activation and discern when a failure
occurs. Thus, in these cases, it becomes imperative to consider the most pessimistic hypothesis:
the application operates on a heterogeneous memory tier that is entirely compromised. Under
such conditions, adversaries may have unrestrained and silent access to read or alter the managed
memory data within this layer. This situation necessitates the implementation of robust passive
security strategies, including encryption and verication mechanisms, to safeguard the applications’
memory, even in such critical scenarios.
Third, most of the existing memory security mechanisms are ecient only with page-based
memory management. While these coarse-grained page-swapping methods [
5
,
35
] simplify memory
allocation and replacement complexities compared to ne-grained management [
24
,
25
,
71
,
81
],
they have signicant drawbacks for applications with memory access patterns that lack locality
or exhibit global randomness. These drawbacks include notable latency uctuations and I/O am-
plication [
1
,
17
] upon page misses. Given that the interconnection bandwidth between memory
hierarchies is often the bottleneck in memory-intensive applications [
15
], this can substantially
impact performance. In these scenarios, ne-grained object-based schemes can be a complementary
choice, oering superior performance [
68
,
81
,
89
], especially for a signicant portion of typical data
management tasks, such as table joins [
11
], key-value queries [
89
], and graph processing [
100
,
108
].
However, achieving robust passive measures for pessimistic scenarios on ne-grained objects is
not straightforward. This is because most data security techniques operate on larger data blocks to
eciently amortize the incurred overhead [
37
]. For example, to ensure the three primary properties
of data security—condentiality, integrity, and freshness—at least three types of metadata are
required with traditional approaches: nonces, digests, and timestamps. Further, the corresponding
algorithms involve initial computation costs unrelated to data block sizes. For xed and suciently
large pages, this may be acceptable. However, if such metadata is at the object level, e.g., a few
bytes in length, the extra space overhead would be several times the eective data payload, clearly
contradicting the primary goal of heterogeneous memory systems—spatial eciency.
Our proposal. In this paper, we delve into object-oriented heterogeneous memory architectures,
initiating the exploration of their data security challenges. We propose the object-oriented Unied
Encrypted Memory (UEM) management for heterogeneous memory architectures. Specically,
UEM is developed in C++ and exposes unied object references, allowing developers to eortlessly
build data management platforms upon heterogeneous memory architectures. They can focus
on data operational logic without becoming entangled in the nuances of memory management.
Interactions between UEM and specic memory devices occur via a unied interface, ensuring that
UEM is not tied to any specic hardware, exhibiting impressive scalability. As for data security,
when objects are written back to the heterogeneous memory tiers through unied references,
their data is encrypted. Similarly, during reads, UEM checks for data integrity and freshness at
dereference, returning the decrypted original content. This entire security enforcement process
remains transparent to developers. Central to our proposal is the way in which UEM provides
cost-eective data security measures rooted in its design philosophy. Instead of viewing objects in
isolation and managing security metadata independently, UEM employs centralized data structures.
Proc. ACM Manag. Data, Vol. 2, No. 3 (SIGMOD), Article 155. Publication date: June 2024.
相关文档
评论