Top Banner
Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT
18

Hashing

Feb 23, 2016

Download

Documents

annis@

Hashing. Then and now Mike Smorul – ADAPT Project. Commodity Storage Performance. 2003 JetStor III IDE-FC 62MB/s large block 2013 218MB/s workstation SSD Perc 6/MD1000, 400MB/s+. Chip Speed. 2003: Pentium 4 3.2Ghz 2013: Core i7 Extreme 3.5Ghz. Hashing Performance. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hashing

HashingTHEN AND NOW

MIKE SMORUL – ADAPT PROJECT

Page 2: Hashing

Commodity Storage Performance

2003 JetStor III IDE-FC62MB/s large block

2013 218MB/s workstation SSDPerc 6/MD1000, 400MB/s+

Page 3: Hashing

Chip Speed

2003: Pentium 4 3.2Ghz

2013: Core i7 Extreme3.5Ghz

Page 4: Hashing

Hashing Performance

SHA-256 HashingJava: 85MB/sCrypto++: 111-134MB/s

Real World PenaltyJava: 20-40% penalty on

slow seek disk

Page 5: Hashing

Implications

Flipped bottlenecks

Page 6: Hashing

How to overcome

Faster/weaker digestsSimultaneous transfers

Data locality, tape?Improve single stream

performance

Page 7: Hashing

Parallelize Single Stream

Independent IO and digest threads

Always have work for the digest algorithm.

Large files saw over 95% of algorithm potential.

Small files unchanged.

Page 8: Hashing

Securing Data in Motion

?

Page 9: Hashing

Where to apply fixity

Internal integrity servicesAt Transfer via manifestsEnd to End?

Page 10: Hashing

Operational Integrity

Internal AuditingProve your hardwareError, not malice

detectionPeer-Auditing

Prove your friends

Page 11: Hashing

Transporting Integrity

Manifest ListsTransfer validation

Digital SignaturesProve identity

Token BasedProve time

Page 12: Hashing

Chronopolis Integrity

Current:Producer supplied

authoritative manifestPeers locally monitor

integrityManually trace back to

point of ingest

Page 13: Hashing

Chronopolis Integrity

In-progressSingle integrity token back

to ingestIdeal

Tokens issued prior to arrival‘Prove’ the state of data to

point before Chronopolis

Page 14: Hashing

Manifests 2.0

Beyond simple transfer listToken manifestsPortable, embeddable

Python, etc

Page 15: Hashing

Cloud Integrity

Digests in a cloud validate transfer only

Http headers can pass extended integrity informationEnd-user verification

Page 16: Hashing

Integrity as provenance

Integrity checking forward in timeConsumer level verification of

data Integrity from object creation

Start integrity checking before archiving

Page 17: Hashing

Closing

Why are you hashing?What do you want to

prove?Hashing Cost/performance

Page 18: Hashing

Contact

Mike [email protected]://adapt.umiacs.umd.edu/ace