TY - GEN
T1 - Performance study of software-based iSCSI security
AU - Tang, Shuang Yi
AU - Lu, Ying Ping
AU - Du, David H
PY - 2003/1/1
Y1 - 2003/1/1
N2 - In this paper, we study possible iSCSI security different security requirements. To evaluate the performance of different security schemes, we conduct performance experiments using a software-based iSCSI implementation with proper security extensions. In data encryption schemes, we consider two alternatives, IP Security Protocol (IPSec) and Secure Socket Layer (SSL), and compare the resulting iSCSI performances with these two schemes. We find that the software-based iSCSI implementation offers reasonable throughput with a 2 GHz CPU at the network speed of 100Mbps; however, with a 1 GHz CPU, the software implementation is not capable of providing sufficient throughput with triple-DES encrypted storage data. In addition, we also find that IPSec ESP scheme has better performance when the requested data size is small, compared to SSL. Given that both performance and security are critical issues in the deployment of iSCSI, it is important to understand the tradeoffs between them. We believe that this study sheds some helpful light on this understanding.
AB - In this paper, we study possible iSCSI security different security requirements. To evaluate the performance of different security schemes, we conduct performance experiments using a software-based iSCSI implementation with proper security extensions. In data encryption schemes, we consider two alternatives, IP Security Protocol (IPSec) and Secure Socket Layer (SSL), and compare the resulting iSCSI performances with these two schemes. We find that the software-based iSCSI implementation offers reasonable throughput with a 2 GHz CPU at the network speed of 100Mbps; however, with a 1 GHz CPU, the software implementation is not capable of providing sufficient throughput with triple-DES encrypted storage data. In addition, we also find that IPSec ESP scheme has better performance when the requested data size is small, compared to SSL. Given that both performance and security are critical issues in the deployment of iSCSI, it is important to understand the tradeoffs between them. We believe that this study sheds some helpful light on this understanding.
UR - http://www.scopus.com/inward/record.url?scp=84962676042&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84962676042&partnerID=8YFLogxK
U2 - 10.1109/SISW.2002.1183513
DO - 10.1109/SISW.2002.1183513
M3 - Conference contribution
AN - SCOPUS:84962676042
T3 - Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002
SP - 70
EP - 79
BT - Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 1st International IEEE Security in Storage Workshop, SISW 2002
Y2 - 11 December 2002
ER -