DEFY: A Deniable, Encrypted File System for Log-Structured Storage
نویسندگان
چکیده
While solutions for file system encryption can prevent an adversary from determining the contents of files, in situations where a user wishes to hide the existence of data, encryption alone is not sufficient. Indeed, encryption may draw attention to those files, as they may likely contain information the user wishes to keep secret. Consequently, adversarial coercion may motivate the owner to surrender their encryption keys, under duress. This paper presents DEFY, a deniable file system following a log-structured design. Maintaining a log-structure is motivated by the technical constraints imposed by solid-state drives, such as those found in mobile devices. These devices have consequential properties that previous work largely ignores. Further, DEFY provides features not offered by prior work, including: authenticated encryption, fast secure deletion, and support for multiple layers of deniability. We consider security against a snapshot adversary, the strongest deniable filesystem adversary considered by prior literature. We have implemented a prototype based on YAFFS and an evaluation shows DEFY exhibits performance degradation comparable to the encrypted file system for flash, WhisperYAFFS.
منابع مشابه
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications
We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We find that the Windows Vista operating system itself, Microsoft Word, and Google Desktop all compromise the deniability of a TrueCrypt DFS. While staged in the context of TrueCrypt, our research highlights several fundamen...
متن کاملOn Implementing Deniable Storage Encryption for Mobile Devices
Data confidentiality can be effectively preserved through encryption. In certain situations, this is inadequate, as users may be coerced into disclosing their decryption keys. In this case, the data must be hidden so that its very existence can be denied. Steganographic techniques and deniable encryption algorithms have been devised to address this specific problem. Given the recent proliferati...
متن کاملImproving data integrity and performance of cryptographic log structured file systems
Modern File systems like the Cryptographic Log Structured File System are aimed to provide security and confidentiality. Current deployments of such File Systems do not ensure the integrity of encrypted data, stored on disk. Due to Kernel bugs, racing conditions and arbitrary dead-locks, CLFS data can be damaged or modified by users and intruders. Financial systems are particularly concerned wi...
متن کاملProject TWOVAULT – Secure and Selectively Deniable Data Storage
We introduce TWOVAULT, a cryptographic data storage mechanism with novel features that has been designed primarily for securing removable memory devices and Solid State Disks. The design is organization-centric and therefore suitable for large corporations and governmental organizations that wish to control the access and flow of sensitive information. In TWOVAULT, data confidentiality and inte...
متن کاملA Log Structured File System with Snapshots
A log structured file system (LFS) [1] writes all the file system data sequentially in a log-like structure. A log consists of a series of segments where each segment contains both data and inode blocks. Traditional file systems like ext2 usually write inode blocks at a fixed place on the disk, causing overhead due to disk seeks. A log structured file system gathers a segment worth of data in m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015