DEFY: A Deniable, Encrypted File System for Log-Structured Storage

نویسندگان

  • Timothy Peters
  • Mark A. Gondree
  • Zachary N. J. Peterson
چکیده

While solutions for file system encryption can prevent an adversary from determining the contents of files, in situations where a user wishes to hide the existence of data, encryption alone is not sufficient. Indeed, encryption may draw attention to those files, as they may likely contain information the user wishes to keep secret. Consequently, adversarial coercion may motivate the owner to surrender their encryption keys, under duress. This paper presents DEFY, a deniable file system following a log-structured design. Maintaining a log-structure is motivated by the technical constraints imposed by solid-state drives, such as those found in mobile devices. These devices have consequential properties that previous work largely ignores. Further, DEFY provides features not offered by prior work, including: authenticated encryption, fast secure deletion, and support for multiple layers of deniability. We consider security against a snapshot adversary, the strongest deniable filesystem adversary considered by prior literature. We have implemented a prototype based on YAFFS and an evaluation shows DEFY exhibits performance degradation comparable to the encrypted file system for flash, WhisperYAFFS.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications

We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We find that the Windows Vista operating system itself, Microsoft Word, and Google Desktop all compromise the deniability of a TrueCrypt DFS. While staged in the context of TrueCrypt, our research highlights several fundamen...

متن کامل

On Implementing Deniable Storage Encryption for Mobile Devices

Data confidentiality can be effectively preserved through encryption. In certain situations, this is inadequate, as users may be coerced into disclosing their decryption keys. In this case, the data must be hidden so that its very existence can be denied. Steganographic techniques and deniable encryption algorithms have been devised to address this specific problem. Given the recent proliferati...

متن کامل

Improving data integrity and performance of cryptographic log structured file systems

Modern File systems like the Cryptographic Log Structured File System are aimed to provide security and confidentiality. Current deployments of such File Systems do not ensure the integrity of encrypted data, stored on disk. Due to Kernel bugs, racing conditions and arbitrary dead-locks, CLFS data can be damaged or modified by users and intruders. Financial systems are particularly concerned wi...

متن کامل

Project TWOVAULT – Secure and Selectively Deniable Data Storage

We introduce TWOVAULT, a cryptographic data storage mechanism with novel features that has been designed primarily for securing removable memory devices and Solid State Disks. The design is organization-centric and therefore suitable for large corporations and governmental organizations that wish to control the access and flow of sensitive information. In TWOVAULT, data confidentiality and inte...

متن کامل

A Log Structured File System with Snapshots

A log structured file system (LFS) [1] writes all the file system data sequentially in a log-like structure. A log consists of a series of segments where each segment contains both data and inode blocks. Traditional file systems like ext2 usually write inode blocks at a fixed place on the disk, causing overhead due to disk seeks. A log structured file system gathers a segment worth of data in m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015