Cache of cryptographic key based on query popularity

In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key service.With the increase of the key resource, the occupied memory space also grows, bringing the bottleneck of memory space and key indexing.Ther...

Full description

Saved in:
Bibliographic Details
Main Authors: Wei JIN, Fenghua LI, Ziyan ZHOU, Xiyang SUN, Yunchuan GUO
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2023-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023008
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529665094680576
author Wei JIN
Fenghua LI
Ziyan ZHOU
Xiyang SUN
Yunchuan GUO
author_facet Wei JIN
Fenghua LI
Ziyan ZHOU
Xiyang SUN
Yunchuan GUO
author_sort Wei JIN
collection DOAJ
description In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key service.With the increase of the key resource, the occupied memory space also grows, bringing the bottleneck of memory space and key indexing.There are three challenges induced: how to organize cached data and efficiently handle queries with missed keys, how to adjust key resources in the cache, and how to accurately predict the use of keys.In order to achieve fine-grained and efficient caching and improve the efficiency of key use, key caching optimization was considered from three aspects: key index data structure, key replacement algorithm, and key prefetching strategy.An architecture of key cache replacement module was designed, and then a key replacement algorithm based on the query frequency was set.Specifically, from the perspective of heat computing and key replacement, the potential influencing factors affecting the popularity of key cache were analyzed which considered the file system and user of key management system.Besides, the basic model of key usage popularity was constructed.The hash table and minheap linked list was combined to maintain the heat of the key in use, and the elimination algorithm was set based on heat identification.The key in the cache was dynamically updated, and key usage was adjusted by the time controller, so as to realize key replacement according to the key heat.For key prefetching, key usage rules were obtained through log mining and periodical usage analyzing of key provisioning policies, which considered business processes and the time period dimension of user accessing.Experimental results show that the proposed key replacement algorithm can effectively improve the hit rate of cache queries, reduce memory usage, and ameliorate the impact of key file I/O interaction on query performance.
format Article
id doaj-art-f6114b7816d84f00b6b2b6600cdf061b
institution Kabale University
issn 2096-109X
language English
publishDate 2023-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-f6114b7816d84f00b6b2b6600cdf061b2025-01-15T03:16:28ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2023-02-019839159577187Cache of cryptographic key based on query popularityWei JINFenghua LIZiyan ZHOUXiyang SUNYunchuan GUOIn the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key service.With the increase of the key resource, the occupied memory space also grows, bringing the bottleneck of memory space and key indexing.There are three challenges induced: how to organize cached data and efficiently handle queries with missed keys, how to adjust key resources in the cache, and how to accurately predict the use of keys.In order to achieve fine-grained and efficient caching and improve the efficiency of key use, key caching optimization was considered from three aspects: key index data structure, key replacement algorithm, and key prefetching strategy.An architecture of key cache replacement module was designed, and then a key replacement algorithm based on the query frequency was set.Specifically, from the perspective of heat computing and key replacement, the potential influencing factors affecting the popularity of key cache were analyzed which considered the file system and user of key management system.Besides, the basic model of key usage popularity was constructed.The hash table and minheap linked list was combined to maintain the heat of the key in use, and the elimination algorithm was set based on heat identification.The key in the cache was dynamically updated, and key usage was adjusted by the time controller, so as to realize key replacement according to the key heat.For key prefetching, key usage rules were obtained through log mining and periodical usage analyzing of key provisioning policies, which considered business processes and the time period dimension of user accessing.Experimental results show that the proposed key replacement algorithm can effectively improve the hit rate of cache queries, reduce memory usage, and ameliorate the impact of key file I/O interaction on query performance.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023008key managementcache managementusage frequency calculationkey replacement algorithm
spellingShingle Wei JIN
Fenghua LI
Ziyan ZHOU
Xiyang SUN
Yunchuan GUO
Cache of cryptographic key based on query popularity
网络与信息安全学报
key management
cache management
usage frequency calculation
key replacement algorithm
title Cache of cryptographic key based on query popularity
title_full Cache of cryptographic key based on query popularity
title_fullStr Cache of cryptographic key based on query popularity
title_full_unstemmed Cache of cryptographic key based on query popularity
title_short Cache of cryptographic key based on query popularity
title_sort cache of cryptographic key based on query popularity
topic key management
cache management
usage frequency calculation
key replacement algorithm
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023008
work_keys_str_mv AT weijin cacheofcryptographickeybasedonquerypopularity
AT fenghuali cacheofcryptographickeybasedonquerypopularity
AT ziyanzhou cacheofcryptographickeybasedonquerypopularity
AT xiyangsun cacheofcryptographickeybasedonquerypopularity
AT yunchuanguo cacheofcryptographickeybasedonquerypopularity