Skip to main content
. 2018 Sep 6;13(9):e0202752. doi: 10.1371/journal.pone.0202752

Table 2. Additional effort for data and privacy protection using a Trusted Server.

Issue Comment Additional effort
Basic installation Two servers, host and virtual machine, have to be installed, LUKS-disk encryption needs to be set up and sealing scripts have to be installed. about factor 3
Customization Task-specific software installation and configuration is required on the virtual machine only and in a conventional fashion. none
Initialization and Sealing Depends on installation size, disk- and system performance. Values relate to a fully functional standard Debian GNU/Linux system on two different hardware platforms. 25 minutes on older 2CPU/8GB/SATA Laptop
15 minutes on 12CPU/32GB/SAS Server
Backup & Restore Duration depends on disk and interface performance and installation size.
Any data uploaded after sealing at least decryption keys have to be uploaded again after sealing.
+ second disk restore
+ sealing
+ data or key upload
System update Full restore and sealing is needed, update times itself are equal to unsecured server but have to be applied to host and virtual machine. + restore
+ double updates
+ sealing
System stability No instability or otherwise different behavior compared to our conventional servers was observed during one year of operation on several servers. none
Performance degradation Possible impact on performance by LUKS disk encryption or the virtual machine is not observable on any modern hardware. not observable
Resource consumption Moderately better equipment is required. + second disk
+ 4 GB RAM for host