Computer Science ›› 2020, Vol. 47 ›› Issue (7): 278-281.doi: 10.11896/jsjkx.190700110

• Information Security • Previous Articles     Next Articles

Encrypted Dynamic Configuration Method of FPGA Based on Cloud

CHEN Li-feng1, ZHU Lu-ping2   

  1. 1 National Demonstration Center for Experimental Computer Education,Fudan University,Shanghai 200433,China
    2 Troops 91045,Shanghai 200940,China
  • Received:2019-07-17 Online:2020-07-15 Published:2020-07-16
  • About author:CHEN Li-feng,born in 1977,doctor.His main research interests include embedded system application,and machine learning.
  • Supported by:
    This work was supported by the Sub Project of HGJ Major Project(KCH230110)

Abstract: In the field of parallel computing which needs a lot of data,such as cloud computing,machine learning algorithm,artificial intelligence computing,etc.,as an important technical means to improve performance,FPGA has been widely used.In the configuration of FPGA,configuration data need to be read from memory and then written into the FPGA.As a practical embodiment of technological achievements,configuration data has the problem of how to prevent data from being illegally acquired,lea-ding to the leakage of research property.In order to deal with this problem,this paper proposes an effective method of FPGA configuration based on cloud encryption.This method encrypts and manages the configuration data file by cloud-based encryption APP.When configuring the FPGA,the microprocessor obtains the encrypted configuration data through the access port of the cloud-based server,and decrypts it using the decryption algorithm built in the microprocessor.Then,the decrypted data are used dynamically to config the FPGA.The method described in this paper stores the configuration data of the FPGA in the cloud ser-ver,and carries out strict data protection and file protection through encryption means on the cloud server,thus providing a flexible and powerful encryption protection capability.The microprocessor obtains data from the cloud through encryption channel,decrypts the encrypted data and then uses it for the configuration of FPGA.In the whole process,the configuration data are encrypted,and the risk of data leakage is effectively controlled.Thus,the configuration data can be protected to the maximum extent to prevent illegal acquisition and use,meanwhile the remote dynamic configuration of the FPGA can be realized.The proposed method has been verified in Aliyun and Tencent cloud platforms,which achieves good confidentiality and flexible configuration.

Key words: Asymmetric encryption, Cloud storage security, Data protection, Dynamic configuration of FPGA, Symmetric encryption

CLC Number: 

  • G201
[1]DI H.Research on Data Encryption Based on Cloud Computing Platform[J].Journal of Changchun Normal University,2017,36(3):55-58.
[2]MENG Q,MA J F,CHEN K F,et al.A comparison scheme of Internet of things encrypted data based on cloud computing platform[J].Journal of Communications,2018,4:65-70.
[3]ZHANG Y.Fuzzy searchable encryption algorithm for privacy information of cloud platform [J].Electronic Technology and Software Engineering,2018(8):214-214.
[4]ZHAO T G,DING Y W.Research on cloud storage security cross encryption algorithm [J].Software Guide,2018,17(10):204-208.
[5]DENG C Z,LEI Q.Construction and implementation of RSAcloud storage security platform loaded with random oracle model[J].Journal of Huaihua University,2019,38(5):65-69.
[6]JI P,LV X M,SU S T,et al.A new sequence preserving encryption algorithm based on coding tree in cloud environment [J].Computer Engineering,2018,44(12):288-293.
[7]DU Y Z,DU X H,YANG Z.Information flow control and Implementation Based on attribute encryption in cloud computing environment [J].Computer Engineering,2018(3):27-36.
[8]ZHANG H Y.Application of data encryption technology incomputer network communication security [J].Digital Techno-logy and Application,2018(12).
[9]LU Y,CHEN Y,LI T,et al.Convolutional Neural Network
Construction Method for Embedded FPGAs Oriented Edge Computing.Journal[J].Journal of Computer Research and Development,2018,55(3):551-562.
[10]GU L,XU G L,WANG Y R.Dynamic Reconfiguration Theory and Research Development of FPGA[J].Computer Measurement and Control,2007(11):1-4.
[11]LIU K,CAI X J,ZHANG Z Y,et al.NVM verification architecture design and verification based on high performance SOC FPGA array[J].Computer Research and Development,2018,55(2):265-272.
[12]LU Q S,XU Y S.Design of target recognition and tracking system based on FPGA [J].Modern Electronic Technology,2018(18):3-8.
[13]CUI G X.Design of online hardware practice teaching platform based on FPGA[J].Experimental Teaching and Innovation,2017,36(4):153-156.
[14]Xilinx Corp.Xilinx FPGAs Configuration User Guide,UG470(v1.13.1)[EB/OL].
[15]PANG Y Y,WANG S J,PENG X Y.Research on design method of remote reconfigurable system based on SOPC [J].Journal of Electronic Measurement and Instruments,2010(6):548-554.
[16]ZHANG Y,FAN J H,LV Z M,et al.Overview of FPGA dy-namic partial reconfiguration technology [J].Computer and Modernization,2014(3):49-53.
[17]XIONG J B,ZHANG Y Y,TIAN Y L,et al.Cloud data security de duplication based on role symmetric encryption[J].Journal of Communications,2018,39(5):59-73.
[18]COMPTON K,HAUCK S.Reconfigurable Computing:A Su-rvey of Systems and Software[J].ACM Computing Surveys,2002,2(2):936-938.
[1] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[2] ZHENG Jia-tong, WU Wen-yuan. Practical Bi-deniable Encryption Scheme Based on MLWE [J]. Computer Science, 2021, 48(3): 307-312.
[3] LENG Feng, ZHANG Ming-kai, YAN Zhi-wei, ZHANG Cui-ling, ZENG Yu. Application of Chinese Cryptographic Algorithm in RPKI [J]. Computer Science, 2021, 48(11A): 678-681.
[4] XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115.
[5] PANG Xiao-qiong, REN Meng-qi, WANG Tian-qi, CHEN Wen-jun, NIE Meng-fei. Perfect Privacy-preserving Batch Provable Data Possession [J]. Computer Science, 2018, 45(11): 130-137.
[6] WANG Chao,LI Zhan-huai,LIU Hai-long and ZHANG Xiao-fang. RM-LCDF:A Recovery Method for Block-level Continuous Data Protection [J]. Computer Science, 2013, 40(6): 172-177.
[7] . Improved Data Sharing Scheme over Cloud Storage [J]. Computer Science, 2012, 39(8): 99-103.
[8] WU Shi-zhong, XIONG Qi, LIU Hui, LIU Lin, WANG Li-na. Implementation of a File-level Continuous Data Protection System and its Survivability Quantification [J]. Computer Science, 2012, 39(2): 109-114.
[9] LIU Lin,XIONG Qi,WU Shi-zhong. Survey of Data Consistency Insurance Technologies for Continuous Data Protection [J]. Computer Science, 2011, 38(Z10): 124-127.
[10] HOU Li-man,LI Zhan-hua,HU Na. Neighboring Point Data Recovery for CDP Based on Data Gap [J]. Computer Science, 2011, 38(5): 159-163.
Full text



No Suggested Reading articles found!