期刊文献+

基于单根I/O虚拟化的密码设备中断频率优化方法

Interrupt frequency optimization method of encryption device based on single root I/O virtualization
下载PDF
导出
摘要 针对虚拟化环境下中断频率过大影响密码设备密码运算性能的问题,提出了一种降低中断频率的性能优化方法。首先建立了中断频率控制模型,通过实验验证了该模型的合理性和正确性;然后基于单根I/O虚拟化,在虚拟功能驱动层加入速度监测模块来实时监测加密速度的变化,并且当该模块监测到加密速度降低时自动调整虚拟功能中断频率上限,降低由中断频率过大带来的I/O传输消耗。实验结果表明,中断频率上限的调整显著提高了I/O密集型加密过程的加密速度。 Aiming at the problem that the interrupt frequency in the virtual environment is too large to affect the cryptographic computing performance of the encryption device,this paper proposed a performance optimization method to reduce the interrupt frequency.Firstly,the method established the interrupt frequency control model and the rationality and correctness of the model was verified by experiments.Then,based on single root I/O virtualization,adding a speed monitoring module at the virtual function driving layer to monitor the change of the encryption speed in real time,and when the module detected that the encryption speed reduced,it automatically adjusted the upper limit of the virtual function interruption frequency to reduce the interruption frequency.The process reduced excessive I/O transfer consumption.The experimental results show that the adjustment of the upper limit of the interrupt frequency significantly improves the encryption speed of the I/O intensive encryption process.
作者 李帅 孙磊 郭松辉 Li Shuai;Sun Lei;Guo Songhui(Information Engineering University,Zhengzhou 450001,China)
机构地区 信息工程大学
出处 《计算机应用研究》 CSCD 北大核心 2019年第9期2798-2802,2808,共6页 Application Research of Computers
基金 国家重点研发计划项目
关键词 中断频率 单根I/O虚拟化 控制模型 加密速度 interruption frequency single root I/O virtualization control model encryption speed
  • 相关文献

参考文献3

二级参考文献105

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 3张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34.
  • 4Garg V K.Elements of Distributed Computing.Wiley-IEEE Press,2002.
  • 5Foster I,Kesselman C,Tuecke S.The anatomy of the grid:Enabling scalable virtual organizations.International Journal of High Performance Computing Applications,2001,15(3):200-222.
  • 6Schoder D,Fischbach K.Peer-to-peer prospects.Communications of the ACM,2003,46(2):27-29.
  • 7Mell P,Grance T.The NIST definition of cloud computing (draft).NIST Special Publication,2011,800:145.
  • 8Almorsy M,Grundy J,Müller I.An analysis of the cloud computing security problem//Proceedings of the 2010 Asia Pacific Cloud Workshop,Collocated with APSEC2010.Sydney,Australia,2010:1-10.
  • 9Chen Y,Paxson V,Katz R H.What' s new about cloud computing security? University of California,Berkeley Report No.UCB/EECS 2010-5,January,2010.
  • 10Ristenpart T,Tromer E,Shacham H,et al.Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds//Proceedings of the 16th ACM Conference on Computer and Communications Security.Chicago,USA,2009:199-212.

共引文献494

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部