Encrypt-FS: A Versatile Cryptographic File System for Linux
|
|
|
- Mariah Blair
- 10 years ago
- Views:
Transcription
1 Encrypt-FS: A Versatile Cryptographic File System for Linux Abstract Recently, personal sensitive information faces the possibility of unauthorized access or loss of storage devices. Cryptographic technique gives a promising way to protect our files. In this paper we describe the design and implementation of Encrypt-FS, a high efficient and reliable cryptographic file system that provides dynamic data encryption and decryption at system level. Two cryptographic algorithms are used to encrypt a file: a symmetric cryptographic algorithm to cipher file s contents and a public key algorithm to encrypt the key that the symmetric cryptographic algorithm uses. File sharing and enhanced security are also included in Encrypt-FS. We evaluate its performance using Iozone and Bonnie benchmarks. 1. Introduction Data sharing is playing a more and more important role in our society. At the same time, personal sensitive information faces the possibility of unauthorized access or loss of storage devices. How to trustily secure the data has become a difficult problem. Cryptographic technique is a promising way to protect our files against unauthorized access. Nowadays people have developed so many useful cryptographic algorithms, from old DES (Data Encryption Standard) to recent IDEA (International Data Encryption Algorithm), AES (Advanced Encryption Standard) and etc. Some user-level tools (e.g. crypt program) based on these strong and speedy algorithms have come out to help users do the encryption and decryption routines, but they are not so convenient, not well integrated with the whole system and sometimes may be vulnerable to non-cryptoanalytic system level attacks. Encrypt-FS tries to solve the above limitations by integrating cryptographic services in file system level. It is not designed to be a brand-new file system like Ext2, Ext3. Encrypt-FS works on Linux VFS layer, providing a cryptographic engine for dynamic encryption and decryption to upper processes. Therefore, user-level applications can work well without modification, and encrypted files can be stored anywhere in any directory hierarchy within any specific file system. Encrypt-FS uses two cryptographic algorithms to encrypt a file: a symmetric cryptographic algorithm like AES to cipher the file s contents, and a public key algorithm like RSA to encrypt the key that the symmetric cryptographic algorithm uses. This combinative approach could provide both reliable security and high performance. 2. Related work 2.1 For UNIX There have existed several related projects for the UNIX operating system that offer transparent cryptographic protection for files or complete file systems, such as
2 Reiser4 [1], CFS [2], TCFS [3], FSFS [4] and Crypt-FS [5]. These file systems have more or less inherent limitations and security problems. Reiser4 is a redesigned and excellent file system, which also provides encryption via file plug-ins. The main problem is that users who wish to use the cryptographic feature are confined to a specific file system. CFS and TCFS offer encryption via a NFS client-server model. They may encounter the following issues: It is not so convenient to use them. In order to use an encrypted file, users have to first attach it, and then input the encryption key, and finally detach it. Attached files must be accessed from a special mount point (/crypt). Users have no choices on cryptographic algorithms as well. It is difficult to share an encrypted file. Only the creator can open, read and write the file. If the owner wishes to share this file among others, he has to give the encryption key to each one, since access will be denied without the key. This way of sharing sensitive files raises potential security issues. Everyone who knows the key has the same status as the legitimate owner and could enable additional users to access the protected files by just giving them the key. And if the owner has decided to remove a person from the allowing list, he has no better way but just changes the password and tells the new key to all the other users. There exists possible leakage of protected information. Because CFS and TCFS work above VFS layer, decrypted data in memory may leak out to swap space or temp files that reside on other unprotected directories. Up to now, to maintain the security from a high level, it is necessary to encrypt all file systems of the machine. This makes it very difficult to use on multi-user machines where some directories are used by several users. All these users would have to share the same key making it quite useless to encrypt the data at all. [4] Degraded performance. Because of using a client-server model, it results in extra overheads and lowers the speed, especially for large files. Crypt-FS (not cryptfs) has the following problems: Crypt-FS has an implementation error. When writing data, Crypt-FS does not judge whether the target pages have been decrypted and thus data may be messed. Crypt-FS does not provide the feature to share files with others either. And it also may encounters the leakage issue mentioned above. 2.2 For Windows On Windows NT and above, users could encrypt their files using the built-in dynamic, efficient and powerful encryption engine, which is called EFS[6]. EFS is such a good model that we refer to its design and implementation. However EFS has two limitations: Only NTFS is supported. EFS uses DESX (an improved version of DES) and RSA combination. Users
3 could not specify the algorithms. And DESX may not be secure enough. 3. Design 3.1 Design Goals Encrypt-FS aims to protect users private information that may be vulnerable to attack in a way that is convenient enough to use routinely. Thus, we propose the following specific goals for Encrypt-FS: 1. Easy to use. Users just need to decide which files should be protected, and Encrypt-FS will automatically deal the processes of creating keys, encrypting files and storing metadata. Subsequent access to those files is transparent, even without inputting keys. Of course, Encrypt-FS should also give an easy way to reverse encrypted files back. 2. Powerful. Encrypt-FS aims to provide enough and powerful functions. Users could choose different encryption algorithms to encrypt their files, share those files with other people, and specify how to recover files when they lost keys. 3. Transparent access semantics. Encrypted files behave no differently from other files. Current programs need not to be modified to access them. They should support the same access methods available on the underlying storage system too. All system calls should work normally, and it should be possible to compile and execute in a completely encrypted environment. 4. Enhanced security. Encrypt-FS should prepare well for the potential security issues. This involves key management, protection of contents and meta-data, exposing data unconsciously (swap, temp file, or memory dump) and etc. We must think much of security in order to protect users information really and truly. 5. High performance. Though we must encrypt and decrypt contents dynamically when accessing encrypted files, the overhead should be low enough, especially to large files. 3.2 Architecture Since we will use two cryptographic algorithms to encrypt a file, 2 kinds of encryption keys exist in Encrypt-FS: FEK and UEK. (1) FEK Symmetric encryption algorithms are used to encrypt files in order to gain both security and performance. Available algorithms are DES, 3DES, AES, IDEA and etc. We prefer AES algorithm and use a 128-bit key by default. Certainly users can choose any one algorithm from the above list and specify the key length. This key that we use is called FEK (File Encryption Key). FEK is randomly generated by Encrypt-FS. FEK should also meet the length and other requirements of the selected algorithm. We must be careful not to generate a weak FEK.
4 Each encrypted file has an exclusive and different FEK. That is for security. Even if an attacker is lucky enough to obtain the FEK of one file, it is not possible for him to guess other FEKs. Therefore other encrypted files are still safe. Further more, we never automatically change the FEK during the lifetime of the encrypted file. (2) UEK Since encrypted files may be shared among several users, it is not wise to tell the FEK to each person. A better way is to encrypt the FEK with a Public Key Algorithm, and store it with the file itself. A user will have a pair of keys: a public key and a private key, and we call them UEK (User Encryption Key). Encrypt-FS of course could generate the pair of keys for users. We prefer RSA algorithm, and use a 124-bit key by default. When the owner wants to share the encrypted file with a person, he firstly imports the public key of that user s UEK, then encrypts the FEK, and finally inserts the encrypted FEK into the Decryption Key Ring--a special area of the file meta-data. Later on, when that user accesses the file, Encrypt-FS will firstly get the user s private key, finds the proper item in the Decryption Key Ring, decrypts the FEK, and finally uses the FEK to decrypt the contents of that file. 4. Implementation Encrypt-FS is implemented on Linux kernel 2.4. When a file is encrypted for the first time, Encrypt-FS saves related meta-data. We modifies several system calls to judge whether an opened file is encrypted, loads saved meta-data and later on provides dynamic encryption and decryption when needed. 4.1 Meta-data The meta-data describes all the encryption information associated with a file. It includes Encryption Head, Decryption Key Ring, Recovery Key Ring and UEK. All except UEK are stored as the file s extended attributes directly. (1) Encryption Head Encryption Head holds the basic encryption information, and it has the following items: MD5 hash value. It verifies the integrality. Version number. The algorithm chosen for encrypting file contents. By default it is AES. FEK length. By default it is 128-bit. The size of the Decryption Key Ring that shows how many key items are stored in this ring. The size of the Recovery Key Ring (2) Decryption Key Ring Decryption Key Ring contains an array of encryption results of the same FEK, and each item consists of:
5 MD5 hash value. It verifies the integrality of this structure. The user s ID that tells who this encrypted FEK belongs to. The public key of the user s UEK. This protects wrong private key from being imported to decrypt the FEK. The encrypted FEK. (3) Recovery Key Ring Recovery Key Ring also contains an array of encryption results of the same FEK. This helps the owner to recover his encrypted file by using a previously designated account when all the allowed users unfortunately could not access the file (rare but possible). (4) UEK UEK plays a vital role in Encrypt-FS, and if the private key leaks out, the whole system breaks. We encourage saving UEK to Smartcards or other physically secure places. Currently, we encrypt the private key of UEK using user s login password, and then place it in directory ~/.encryptfs. We also apply special permission using ACL to make sure that nobody can read the private key file. Surely it is not that safe, so we will improve it in future versions. 4.2 Management of encrypted files Only the file s owner can do things like encrypting and decrypting, adding another user in the share list, or showing status of the encrypted file and etc. We provide a command line program named cipher to do the work. Here we mention how to the process of encrypting a file for the first time: (1) Generate a random key using built-in Kernel generator for later encryption. (2) Create a working temp file (.filename.encryptfs) for saving encrypted contents. Thus the original file will not be destroyed even if the encryption process fails. (3) Read data in chunks sequentially, encrypt the chunk and then write it to the temp file. (4) After encryption, import owner s public key of UEK to encrypt the FEK and set up the Encrypting Head and Decryption Key Ring. (5) Store the meta-data to the temp file as extended attributes in system and apply an exclusive access right using ACL that denies access from other users. (6) Delete the original file and rename the temp file. 4.3 Opening an encrypted file We modify normal access procedure for accessing an encrypted file. Extra steps consist of: (1) Read the Encryption Head attribute and verify its integrality. (2) Read the Decryption Key Ring and find the item for the current user. We must also verify the integrality of the encrypted key structure. (3) Import current user s private key of UEK and try to decrypt the FEK.
6 (4) Save FEK and other information for later operations. If any step fails, we reject the access and return an error to the user. 4.4 Dynamic encryption and decryption Compared with CPU, hard disks are too slow. Thus Linux uses page cache to speed up the reading and writing process. If the page cache stores cryptograph, the data has to be encrypted or decrypted every time when it is accessed. This may greatly slows the whole system especially for accessing large files. Thus Encrypt-FS tries to store decrypted data in page cache long as possible and do encryption only when a buffer is actually written back to disks. We will see that this approach gains considerable performance. The following explains when to encrypt and decrypt data: (1) Data decryption is done in function do_generic_file_read and do_generic_file_write. We first judge whether the target pages (or individual buffers) have been decrypted. If not, we decrypt those pages (or buffers) and mark them decrypted. Of course, writing a full page does not need decryption at all. From now on, subsequent access does not need decryption any more (if they are still marked decrypted). (2) Data encryption is done in function generic_make_request. generic_make_request sends actual requests to lower disk drivers, and thus is a good place to encrypt the buffer. Then we mark this buffer encrypted. 4.5 Prevention from leakage As mentioned above, memory pages store decrypted data nearly all the time. It is necessary to protect the sensitive data from leaking out to swap space and temp files. Because we make sure to encrypt blocks before writing to disks in function generic_make_request, we can solve this security issue. When they are brought back to physical memory, Encrypt-FS will decrypt them on next access. 5. Performance Evaluation Iozone and Bonnie tests were run to evaluate the performance. Our test system is: CPU Memory Hard Drive OS Kernel Target FS Athlon G DDR Maxtor 8G Fedora 1(x86) [7] Ext3 In both of the tests, we consider the following three conditions: No Encrypt-FS support. We did not compile the Encrypt-FS into the kernel. This shows the best performance. Encrypt-FS + Regular. Encrypt-FS was compiled into the kernel, but a non-encrypted file is used in the tests. Encrypt-FS + 128bit AES. Encrypt-FS was compiled into the kernel, and test file is encrypted using 128bit AES algorithm.
7 5.1 Iozone Benchmark Iozone is an excellent file system benchmark tool. This benchmark generates and measures a variety of file operations. Iozone has been ported to many machines and runs under many operating systems. We conducted Read/Reread, Write/Rewrite and Random Read/Random Write tests and figure 1-6 show the results: Write Performance 7 6 KB/sec EncryptFS + Normal EncryptFS + 128bit AES KB Figure 1. Write Performance Rewrite Performance 7 6 KB/sec EncryptFS + Normal EncryptFS + 128bit AES KB Figure 2. Rewrite Performance
8 Read Performance KB/sec KB EncryptFS + Normal EncryptFS + 128bit AES Figure 3. Read Performance Reread Performance KB/sec KB EncryptFS + Normal EncryptFS + 128bit AES Figure 4. Reread Performance
9 Random Read Performance KB/sec KB EncryptFS + Normal EncryptFS + 128bit AES Figure 5. Random Read Performance Random Write Performance KB/sec KB EncryptFS + Normal EncryptFS + 128bit AES Figure 6. Random Write Performance From the figures we see: Because the inherent overhead for accessing small files (< 512K) is rather low, performance degression is remarkable; for larger files (>=512K), performance penalty is less. Extra overhead for non-encrypted files is low. For small files, performance degrades in the range of -5% to -15%; for larger files, performance degrades about -2%. Performance penalty of Encrypt-FS + 128bit AES is about -12% ~ -67% in Write test; -18% ~ -66% in Rewrite test; -1% ~ -27% in Read test; -1% ~ -23% in Reread test; -3% ~ -21% in Random Read test; -1% ~
10 -66% in Rewrite test. Disk cache is highly important to Encrypt-FS. After the first access, data in page cache remains decrypted as long as possible, thus the overall performance upgrades remarkably especially in Reread and Rewrite tests for large files Bonnie Benchmark Bonnie is a file system benchmark written by Tim Bray. It is implemented as a single C program. The program takes arguments for the size of the file it will use and the path where it will be stored. Bonnie then creates the large file and performs many sequential operations on it, including writing character by character, writing block by block, rewriting, reading character by character, reading block by block, and seeking. In this test, we use a file size of 1 GB. Figure 7 shows the performance of the different Bonnie phases: KB/s EncryptFS + Normal EncryptFS + 128bit AES Write per char Write per block Rewrite Read per char Read per block Figure 7. Bonnie results From the figure, we see: 1. Extra overhead for non-encrypted files is less than 7%. 2. Encrypt-FS has a comparatively high performance dealing encrypted files. For Write per block test, performance degrades about 15%; for Read per block test, performance degrades about 35%. 3. For Write per char test, performance degrades about 33%; for Read per char test, performance degrades about 42%. Because manipulating characters randomly surely results in added disk operations. Thus the tests on characters perform less than those on blocks. 4. For Rewrite test, performance degrades about 3%. This test involves lots of random reading and writing operations which consume more extra time in dealing disk operations. At the same time disk operations bring on more
11 encryption and decryption. 6. Conclusions and future work We have described the design and implementation of Encrypt-FS, a comprehensive cryptographic file system suitable for personal and multi-user systems. Users could store their files on any target specific file system, from Ext2, Ext3, ReiserFS to JFS and XFS, as long as the file system supports XATTR (extended attributes). Encrypt-FS offers an easy and secure way to share encrypted files with co-workers. At the same time, we try our best to enhance the security of Encrypt-FS, avoiding leaking out related keys and sensitive information in memory. Test results show that Encrypt-FS is high efficient. In future, we plan to add more extensions to current implementation: (1) File name encryption. Although a file s name is not as important as its content, the name may be meaningful, and thus could expose some information for intruders. (2) Currently Encrypt-FS is implemented on Linux kernel 2.4, we will port it to 2.6 soon. (3) Some other UNIX systems have similar file system architecture with Linux, and we will attempt to port Encrypt-FS to FreeBSD. References [1] H. Reiser. [2] M. Blaze. A Cryptographic Filesystem for Unix. Proceedings of the First ACM Conference on Computer and Communications Security, pp. 9-16, November [3] G. Cattaneo and G. Persiano. Design and Implementation of a Transparent Cryptographic Filesystern for Unix. Unpublished Technical Report, July [4] S. Ludwig and W. Kalfa. File System Encryption with Integrated User Management. ACM SIGOPS Operating Systems Review, Volume 35 Issue 4, pp , October 21. [5] Cheng Ding and Yufang Sun. Crypt-FS: A Cryptographic File System Designed for Linux. Computer Engineering, pp , November 23. [6] Dava Probert and Xiangqun Chen. Principles of the Windows Operating Systems, 2 nd Edition. China Machine Press, November 24. [7]ftp://ftp.redhat.com/pub/redhat/linux/updates/enterprise/3AS/en/os/SRPMS/k ernel el.src.rpm [8] N. Provos. Encrypting Virtual Memory. USENIX Security Symposium. Denver, CO, August
12 2 [9] Decao Mao and Ximing Hu. Linux Kernel: Scenarios and Analyses. Zhejiang University Press, September 21. [1] R. Love. The Linux Kernel Development, 2nd edition. Novell Press, January 25. [11] D. P. Bovet and M. Cesati. Understanding the Linux Kernel, 2nd Edition. O'Reilly, December 22.
File System Encryption with Integrated User Management
File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich [email protected] Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of
CifrarFS Encrypted File System Using FUSE
CifrarFS Encrypted File System Using FUSE Anagha Kulkarni Department of Computer Engineering and Information Technology, College of Engineering, Pune, 411005, India Vandana Inamdar Department of Computer
On Benchmarking Popular File Systems
On Benchmarking Popular File Systems Matti Vanninen James Z. Wang Department of Computer Science Clemson University, Clemson, SC 2963 Emails: {mvannin, jzwang}@cs.clemson.edu Abstract In recent years,
Global Journal of Computer Science and Technology
Global Journal of Computer Science and Technology Volume 12 Issue 10 Version 1.0 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:
Performance Evaluation of Java File Security System (JFSS)
Available online at www.pelagiaresearchlibrary.com Advances in Applied Science Research, 2011, 2 (6):254-260 ISSN: 0976-8610 CODEN (USA): AASRFC Performance Evaluation of Java File Security System (JFSS)
FAQ for USB Flash Drive
FAQ for USB Flash Drive 1. What is a USB Flash Drive? A USB Flash Drive consists of a flash memory data storage device integrated with a USB interface. USB Flash Drives are typically removable and rewritable.
Secure Storage. Lost Laptops
Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include
Filesystems Performance in GNU/Linux Multi-Disk Data Storage
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 22 No. 2 (2014), pp. 65-80 Filesystems Performance in GNU/Linux Multi-Disk Data Storage Mateusz Smoliński 1 1 Lodz University of Technology Faculty of Technical
Presentation on Black Hat Europe 2003 Conference. Security Analysis of Microsoft Encrypting File System (EFS) http://www.elcomsoft.
Presentation on Black Hat Europe 2003 Conference Security Analysis of Microsoft Encrypting File System (EFS) Microsoft Encrypting File System Encrypting File File System System (EFS) (EFS) is is a a new
Akshay Kumar Jain Department of CSE, Jaypee Institute of Engg. & Technology Guna (M.P.), India
(IJCSIS) International Journal of Computer Science and Information Security, Efficient methodology for implementation of Encrypted File System in User Space Dr. Shishir Kumar Department of CSE, Jaypee
File System Encryption in C#
INTEGRATED FILE-LEVEL CRYPTOGRAPHICAL ACCESS CONTROL Abstract Ryan Seifert [email protected] T. Andrew Yang [email protected] Division of Computing and Mathematics University of Houston - Clear Lake,
CHAPTER 17: File Management
CHAPTER 17: File Management The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
File System Management
Lecture 7: Storage Management File System Management Contents Non volatile memory Tape, HDD, SSD Files & File System Interface Directories & their Organization File System Implementation Disk Space Allocation
CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
Dept. of Comp. Sc. & Engg., Shri Jagdishprasad Jhabarmal Tibrewala University (JJTU) Chudella, Jhunjhunu, Rajasthan, INDIA
A Windows Based Java File Security System (JFSS) 1 Brijender Kahanwal, 2 Tejinder Pal Singh, 3 Dr. R. K. Tuteja 1 Dept. of Comp. Sc. & Engg., Shri Jagdishprasad Jhabarmal Tibrewala University (JJTU) Chudella,
Chapter 11: File System Implementation. Operating System Concepts with Java 8 th Edition
Chapter 11: File System Implementation 11.1 Silberschatz, Galvin and Gagne 2009 Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation
Securing the DB2 Database of your SAP System with Windows Encrypting File System
Securing the DB2 Database of your SAP System with Windows Encrypting File System Applies to: All SAP releases on IBM DB2 for Linux, UNIX, and Windows (in the following referred to as DB2 for LUW) on a
1. STORAGE ENCRYPTION AND JAVA FILE SECURITY SYSTEM
1. STORAGE ENCRYPTION AND JAVA FILE SECURITY SYSTEM Nowadays, the attacks are going to increase at the storage data systems. So the security systems are going to turn into a compulsory attribute of any
New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer
New Technologies File System (NTFS) Priscilla Oppenheimer NTFS Default file system for Windows NT, 2000, XP, and Windows Server 2003 No published spec from Microsoft that describes the on-disk layout Good
Network File System (NFS) Pradipta De [email protected]
Network File System (NFS) Pradipta De [email protected] Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS
Encrypted File Systems. Don Porter CSE 506
Encrypted File Systems Don Porter CSE 506 Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue
Flexible Storage Allocation
Flexible Storage Allocation A. L. Narasimha Reddy Department of Electrical and Computer Engineering Texas A & M University Students: Sukwoo Kang (now at IBM Almaden) John Garrison Outline Big Picture Part
Chapter 12 File Management. Roadmap
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Overview Roadmap File organisation and Access
Chapter 12 File Management
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Roadmap Overview File organisation and Access
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
A Reliable File Protection System Based on Transparent Encryption
, pp.123-132 http://dx.doi.org/10.14257/ijsia.2014.8.1.12 A Reliable File Protection System Based on Transparent Encryption Jun Liu 1, ShuYu Chen 2*, MingWei Lin 1 and Han Liu 1 1 College of Computer Science,
File Systems Security Encryption File Systems
ISE331: Fundamentals of Computer Security Spring 2015 Radu Sion File Systems Security Encryption File Systems 2005-15 Thanks to G. Suryanarayana and K. Thangavelu Fair-use educational use of several online
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
tmpfs: A Virtual Memory File System
tmpfs: A Virtual Memory File System Peter Snyder Sun Microsystems Inc. 2550 Garcia Avenue Mountain View, CA 94043 ABSTRACT This paper describes tmpfs, a memory-based file system that uses resources and
SQL Server Encryption Overview. September 2, 2015
SQL Server Encryption Overview September 2, 2015 ABOUT ME Edmund Poillion Data Platform Systems Engineer Skyline Associate since 1999 Started in App Dev, changed focus to SQL Server in 2012 Email: [email protected]
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Enova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
Securing Data at Rest ViSolve IT Security Team
Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data
Chapter 3 Operating-System Structures
Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
Strong Security for Distributed File Systems
Strong Security for Distributed File Systems Ethan Miller Darrell Long William Freeman Benjamin Reed University of California, Santa CruzTRW IBM Research Abstract We have developed a scheme to secure networkattached
Transparent Cryptographic File System for BSD. A primer. Luigi Catuogno [[email protected]]
Transparent Cryptographic File System for BSD. A primer Luigi Catuogno [[email protected]] April 15, 2000 Abstract This document is a quick and dirty introduction to installation and usage of the Transparent
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
Windows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline NTFS File System Formats File System Driver Architecture Advanced Features NTFS Driver On-Disk Structure (MFT,...)
SiRiUS: Securing Remote Untrusted Storage
SiRiUS: Securing Remote Untrusted Storage NDSS 2003 Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, and Dan Boneh Stanford University Introduction Secure network file systems not widespread. Why? 1. Hard
File Systems Management and Examples
File Systems Management and Examples Today! Efficiency, performance, recovery! Examples Next! Distributed systems Disk space management! Once decided to store a file as sequence of blocks What s the size
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
Outline. Windows NT File System. Hardware Basics. Win2K File System Formats. NTFS Cluster Sizes NTFS
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik 2 Hardware Basics Win2K File System Formats Sector: addressable block on storage medium usually 512 bytes (x86 disks) Cluster:
2007 Microsoft Office System Document Encryption
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
Filing Systems. Filing Systems
Filing Systems At the outset we identified long-term storage as desirable characteristic of an OS. EG: On-line storage for an MIS. Convenience of not having to re-write programs. Sharing of data in an
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
Operating System Structures
Operating System Structures Meelis ROOS [email protected] Institute of Computer Science Tartu University fall 2009 Literature A. S. Tanenbaum. Modern Operating Systems. 2nd ed. Prentice Hall. 2001. G. Nutt.
File Systems for Flash Memories. Marcela Zuluaga Sebastian Isaza Dante Rodriguez
File Systems for Flash Memories Marcela Zuluaga Sebastian Isaza Dante Rodriguez Outline Introduction to Flash Memories Introduction to File Systems File Systems for Flash Memories YAFFS (Yet Another Flash
Distributed File Systems
Distributed File Systems Paul Krzyzanowski Rutgers University October 28, 2012 1 Introduction The classic network file systems we examined, NFS, CIFS, AFS, Coda, were designed as client-server applications.
Features. The Samhain HIDS. Overview of available features. Rainer Wichmann
Overview of available features November 1, 2011 POSIX (e.g. Linux, *BSD, Solaris 2.x, AIX 5.x, HP-UX 11, and Mac OS X. Windows 2000 / WindowsXP with POSIX emulation (e.g. Cygwin). Please note that this
Blaze Vault Online Backup. Whitepaper Data Security
Blaze Vault Online Backup Version 5.x Jun 2006 Table of Content 1 Introduction... 3 2 Blaze Vault Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 256-bit SSL communication... 4 2.2 Backup
Summer Student Project Report
Summer Student Project Report Dimitris Kalimeris National and Kapodistrian University of Athens June September 2014 Abstract This report will outline two projects that were done as part of a three months
What users should know about Full Disk Encryption based on LUKS
What users should know about Full Disk Encryption based on LUKS Andrea VISCONTI Department of Computer Science Università degli Studi di Milano BunnyTN15 [email protected] December 17, 2015 1 /
EAC Decision on Request for Interpretation 2008-03 (Operating System Configuration)
EAC Decision on Request for Interpretation 2008-03 (Operating System Configuration) 2002 VSS Volume1: 2.2.5.3, 4.1.1, 6.2.1.1, Volume2: 3.5 2005 VVSG Volume1: 2.1.5.2, 5.1.1, 7.2.1, Volume2: 3.5 Date:
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
1. Introduction to the UNIX File System: logical vision
Unix File System 1. Introduction to the UNIX File System: logical vision Silberschatz, Galvin and Gagne 2005 Operating System Concepts 7 th Edition, Feb 6, 2005 Logical structure in each FS (System V):
Survey of Filesystems for Embedded Linux. Presented by Gene Sally CELF
Survey of Filesystems for Embedded Linux Presented by Gene Sally CELF Presentation Filesystems In Summary What is a filesystem Kernel and User space filesystems Picking a root filesystem Filesystem Round-up
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
EFS Table of Contents
Encrypting File System for Windows 2000 Abstract This document provides an executive summary and a technical overview of the encrypting file system (EFS) that will be included with the Microsoft Windows
A Data De-duplication Access Framework for Solid State Drives
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 941-954 (2012) A Data De-duplication Access Framework for Solid State Drives Department of Electronic Engineering National Taiwan University of Science
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.
Social Sciences Computing a division of File Security John Marcotte Director of February 2008 File Security Review security issues Overview of encryption Software Data Security Plan Questions Reasons for
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Original-page small file oriented EXT3 file storage system
Original-page small file oriented EXT3 file storage system Zhang Weizhe, Hui He, Zhang Qizhen School of Computer Science and Technology, Harbin Institute of Technology, Harbin E-mail: [email protected]
Open Source Encrypted Filesystems for Free Unix Systems
Open Source Encrypted Filesystems for Free Unix Systems George Kargiotakis [email protected] Introduction Users seek ways to secure their data with maximum comfort and minimum requirements. No application
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
StegFS: A Steganographic File System for Linux
StegFS: A Steganographic File System for Linux Andrew D. McDonald and Markus G. Kuhn University of Cambridge, Computer Laboratory, New Museums Site, Pembroke Street, Cambridge CB2 3QG, United Kingdom [email protected]
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters
COSC 6374 Parallel I/O (I) I/O basics Fall 2012 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network card 1 Network card
Chapter 11: File System Implementation. Operating System Concepts 8 th Edition
Chapter 11: File System Implementation Operating System Concepts 8 th Edition Silberschatz, Galvin and Gagne 2009 Chapter 11: File System Implementation File-System Structure File-System Implementation
ProTrack: A Simple Provenance-tracking Filesystem
ProTrack: A Simple Provenance-tracking Filesystem Somak Das Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology [email protected] Abstract Provenance describes a file
Secure Database Backups with SecureZIP
Secure Database Backups with SecureZIP A pproved procedures for insuring database recovery in the event of a disaster call for backing up the database and storing a copy of the backup offsite. Given the
GostCrypt User Guide. Laboratoire de Cryptologie et de Virologie Opérationnelles - France
GostCrypt User Guide Laboratoire de Cryptologie et de Virologie Opérationnelles - France Copyright c 2014 Laboratoire de Cryptologie et de Virologie Opératoinnelles - France GOSTCRYPT.ORG Contents 1 Introduction.................................................
CS 416: Opera-ng Systems Design
Question 1 Explain the major difference between a file system that supports journaling (e.g., Linux ext4) versus a log-structured file system (e.g., YAFFS2). Operating Systems 2015 Exam 3 Review Paul Krzyzanowski
Innovative Secure Boot System (SBS) with a smartcard.
Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable
DualFS: A New Journaling File System for Linux
2007 Linux Storage & Filesystem Workshop February 12-13, 13, 2007, San Jose, CA DualFS: A New Journaling File System for Linux Juan Piernas SDM Project Pacific Northwest National
