Hiding Data Accesses in Steganographic File System
To support ubiquitous computing, the underlying data have to be persistent and available anywhere-anytime. The data thus have to migrate from devices local to individual computers, to shared storage volumes that are accessible over open network. This potentially exposes the data to heightened securi...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2004
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1142 https://ink.library.smu.edu.sg/context/sis_research/article/2141/viewcontent/hidingDataAccess_edited_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2141 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-21412018-07-13T02:58:38Z Hiding Data Accesses in Steganographic File System ZHOU, Xuan PANG, Hwee Hwa TAN, Kian-Lee To support ubiquitous computing, the underlying data have to be persistent and available anywhere-anytime. The data thus have to migrate from devices local to individual computers, to shared storage volumes that are accessible over open network. This potentially exposes the data to heightened security risks. We propose two mechanisms, in the context of a steganographic file system, to mitigate the risk of attacks initiated through analyzing data accesses from user applications. The first mechanism is intended to counter attempts to locate data through updates in between snapshots - in short, update analysis. The second mechanism prevents traffic analysis - identifying data from I/O traffic patterns. We have implemented the first mechanism on Linux and conducted experiments to demonstrate its effectiveness and practicality. Simulation results on the second mechanism also show its potential for real world applications. 2004-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1142 info:doi/10.1109/ICDE.2004.1320028 https://ink.library.smu.edu.sg/context/sis_research/article/2141/viewcontent/hidingDataAccess_edited_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University I/O traffic patterns Linux steganographic file system ubiquitous computing Databases and Information Systems Numerical Analysis and Scientific Computing |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
I/O traffic patterns Linux steganographic file system ubiquitous computing Databases and Information Systems Numerical Analysis and Scientific Computing |
spellingShingle |
I/O traffic patterns Linux steganographic file system ubiquitous computing Databases and Information Systems Numerical Analysis and Scientific Computing ZHOU, Xuan PANG, Hwee Hwa TAN, Kian-Lee Hiding Data Accesses in Steganographic File System |
description |
To support ubiquitous computing, the underlying data have to be persistent and available anywhere-anytime. The data thus have to migrate from devices local to individual computers, to shared storage volumes that are accessible over open network. This potentially exposes the data to heightened security risks. We propose two mechanisms, in the context of a steganographic file system, to mitigate the risk of attacks initiated through analyzing data accesses from user applications. The first mechanism is intended to counter attempts to locate data through updates in between snapshots - in short, update analysis. The second mechanism prevents traffic analysis - identifying data from I/O traffic patterns. We have implemented the first mechanism on Linux and conducted experiments to demonstrate its effectiveness and practicality. Simulation results on the second mechanism also show its potential for real world applications. |
format |
text |
author |
ZHOU, Xuan PANG, Hwee Hwa TAN, Kian-Lee |
author_facet |
ZHOU, Xuan PANG, Hwee Hwa TAN, Kian-Lee |
author_sort |
ZHOU, Xuan |
title |
Hiding Data Accesses in Steganographic File System |
title_short |
Hiding Data Accesses in Steganographic File System |
title_full |
Hiding Data Accesses in Steganographic File System |
title_fullStr |
Hiding Data Accesses in Steganographic File System |
title_full_unstemmed |
Hiding Data Accesses in Steganographic File System |
title_sort |
hiding data accesses in steganographic file system |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2004 |
url |
https://ink.library.smu.edu.sg/sis_research/1142 https://ink.library.smu.edu.sg/context/sis_research/article/2141/viewcontent/hidingDataAccess_edited_.pdf |
_version_ |
1770570874629390336 |