Skip to main content
Top
Published in:
Cover of the book

2017 | OriginalPaper | Chapter

Reducing Costs in HSM-Based Data Centers

Authors : R. De Prisco, A. De Santis, M. Mannetta

Published in: Green, Pervasive, and Cloud Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Hardware Security Modules (HSM) are special purpose devices designed for cryptographic operations, mostly used for cryptographic keys management. To achieve high security standard, an HSM stores keys internally and never exposes them in plaintext; operations involving the keys are performed internally and only the result is given outside the HSM. Thus an HSM must have storage space to store all the keys that have to be managed. In real-world application this might require a huge amount of space (e.g. millions of keys) resulting in large data centers needed to host many HSMs. Related costs, such as cost of the hardware, energy consumption, hosting, management, etc. are directly proportional to the number of HSMs used. In this paper we present a technique that allows to save space for storing keys in an HSM, thus reducing the number of needed HSMs. While saving space allows to reduce direct costs, it comes at the expense of computation time. We provide a preliminary experimental evaluation of the extra time needed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference National Institute of Standards and Technologies. Recommendation for Random Number Generation Using Deterministic Random Bit Generators. Technical report SP 800-90A Rev 1 (2015) National Institute of Standards and Technologies. Recommendation for Random Number Generation Using Deterministic Random Bit Generators. Technical report SP 800-90A Rev 1 (2015)
2.
go back to reference National Institute of Standards and Technologies. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical report SP 800-22 (2010) National Institute of Standards and Technologies. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical report SP 800-22 (2010)
3.
4.
go back to reference Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudorandom bits. SIAM J. Comput. 13(4), 850–864 (1984)MathSciNetCrossRefMATH Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudorandom bits. SIAM J. Comput. 13(4), 850–864 (1984)MathSciNetCrossRefMATH
5.
go back to reference Salvaro, T.C., Martina, J.E., Custodio, R.F.: Audit and backup procedures for hardware security modules. In proceedings of the 7th Symposium on Identity and Trust on the Internet. ACM press, pp. 89–97 (2008) Salvaro, T.C., Martina, J.E., Custodio, R.F.: Audit and backup procedures for hardware security modules. In proceedings of the 7th Symposium on Identity and Trust on the Internet. ACM press, pp. 89–97 (2008)
6.
go back to reference Focardi, R., Luccio, F.L.: Secure upgrade of hardware security modules in bank networks. In: Armando, A., Lowe, G. (eds.) ARSPA-WITS 2010. LNCS, vol. 6186, pp. 95–110. Springer, Heidelberg (2010). doi:10.1007/978-3-642-16074-5_7 CrossRef Focardi, R., Luccio, F.L.: Secure upgrade of hardware security modules in bank networks. In: Armando, A., Lowe, G. (eds.) ARSPA-WITS 2010. LNCS, vol. 6186, pp. 95–110. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-16074-5_​7 CrossRef
7.
go back to reference Katz, J., Lindell, Y.: Introduction to Modern Cryptography (Second Edition). CRC Press (2015). ISBN-13: 978-1466570269 Katz, J., Lindell, Y.: Introduction to Modern Cryptography (Second Edition). CRC Press (2015). ISBN-13: 978-1466570269
8.
go back to reference Mavrovouniotis, S., Ganley, M.: Hardware security modules. In: Markantonakis, K., Mayes, K. (eds.) Secure Smart Embedded Devices, Platforms and Applications, pp. 383–405. Springer, New York (2014). doi:10.1007/978-1-4614-7915-4_17. ISBN 978-1-4614-7914-7. Chap. 17CrossRef Mavrovouniotis, S., Ganley, M.: Hardware security modules. In: Markantonakis, K., Mayes, K. (eds.) Secure Smart Embedded Devices, Platforms and Applications, pp. 383–405. Springer, New York (2014). doi:10.​1007/​978-1-4614-7915-4_​17. ISBN 978-1-4614-7914-7. Chap. 17CrossRef
9.
go back to reference Goldrech, O., Goldwasser, S., Micali, S.: How to construct random functions. J. Assoc. Comput. Mach. 33(4), 792–807 (1986)MathSciNetCrossRef Goldrech, O., Goldwasser, S., Micali, S.: How to construct random functions. J. Assoc. Comput. Mach. 33(4), 792–807 (1986)MathSciNetCrossRef
10.
go back to reference Park, S.K., Miller, K.W.: Random number generators: good ones are hard to find. Commun. ACM 31(10), 1192–1201 (1988)MathSciNetCrossRef Park, S.K., Miller, K.W.: Random number generators: good ones are hard to find. Commun. ACM 31(10), 1192–1201 (1988)MathSciNetCrossRef
Metadata
Title
Reducing Costs in HSM-Based Data Centers
Authors
R. De Prisco
A. De Santis
M. Mannetta
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-57186-7_1

Premium Partner