A Device Mapper based Encryption Layer for TransCrypt
#1

A Device Mapper based Encryption Layer for TransCrypt


Data security has come to be of utmost importance in the recent times. Several encrypting file systems have been designed to solve the problem of providing data security in a secure and transparent manner. TransCrypt is such an encrypting file system, which is implemented in kernel space, has an advanced key management scheme and is designed to be deployable in an enterprise scenario. It uses per-file cryptographic keys for flexible sharing and does not include even the superuser in its trust model.

Earlier, TransCrypt was implemented on the Linux kernel (version 2.6). In the implementation, several modifications were made to the existing kernel to embed the TransCrypt functionality. Such modifications also changed the file I/O behaviour in the kernel, in order to add a cryptographic layer to perform encryption and decryption on the file data. The kernel thus modified had several limitations with respect to functionality, maintainability and performance.

In this thesis, we propose a new cryptographic layer for the TransCrypt file system. This layer is implemented as a kernel module and does not modify any existing kernel code. The module uses the device-mapper infrastructure provided by the Linux kernel. The new layer addresses several limitations of the earlier implementation, and is robust and stable. Performance gains of over 90 percent were observed in read and write operations on large files with the new implementation. The design and implementation details of the new cryptographic layer and performance measurements are discussed in this work.
Reply
#2
[attachment=15208]
1.1 Motivation
In the recent times, data storage has become increasingly common and more a ord-
able. Archiving important data on storage mediums like USB disks and le servers
is a very common usage scenario among desktop and corporate users. Data security
is therefore of utmost importance, especially against data thefts, which impose risks
of losing signi cant personal and organisational data [1, 2]. There is an acute need
for a storage solution which uses strong cryptographic methods to protect data.
An encrypting le system provides the much needed solution to the problem
of data protection. There are several encrypting le systems (see section 1.2) which
provide security by encrypting and decrypting data transparent to a user. Although
the di erent encrypting le systems address the problem of data security in di erent
ways, a combination of features such as per- le encryption,
exible key-sharing and
exclusion of superuser from the trust model makes the le system more secure and
customizable. TransCrypt [3] le system was created on the basis of these features to
provide a very strong solution to the problem of securing data in a user transparent
manner.
TransCrypt is an enterprise-class, kernel-space encrypting le system for the
Linux [4] operating system, which incorporates an advanced key management scheme
to provide a high grade of security, while remaining transparent and easily usable.
The initial implementation of TransCrypt [5, 6] was carried out as modi cations
to the ext3 [7] le system on Linux. Userspace packages speci c to the ext3 le
system were also modi ed. The Linux kernel code undergoes changes periodically
as new features and bug xes are added to subsequent releases. Since a signi cant
part of the TransCrypt le system includes modi cations to existing Linux kernel
code, changes to the code need to be tracked and updated for every kernel upgrade.
Dependency due to modi cations to the existing kernel code implies a constraint on
the usage of TransCrypt over only the ext3 le system. The need was felt for a
improved TransCrypt le system which is independent of the modi cations to the
underlying native le system code. This had the potential to exploit the advantages
of various other underlying le systems.
Desirable characteristics of an encrypting le system include performance and
ease of use, apart from a high grade of security. If a user perceives the read and write
operations to be slow on a TransCrypt le system compared to that on a normal
lesystem, then a potential wide scale deployment of the encrypted lesystem would
be hard to implement. The earlier implementation of TransCrypt was based on the
modi cations in the le I/O functionality in the kernel. It had several performace and
maintenance related limitations. A need was felt to improve on the performance of
TransCrypt le system, as well as to improve maintainability
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: friend mapper on mobiles, friend mapper on mobiles ppt, ieee base paper for friend mapper, aa route mapper ireland, curriculum mapper clihome, friend mapper on mobiles abstract in ieee format, vvirtual energy based encryption,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  TEA ENCRYPTION (ALGORITHM) computer science technology 1 2,659 11-11-2014, 10:45 AM
Last Post: Guest
Wink Implementation of a simple device mediation application of a Network Management Syste computer science crazy 2 2,164 06-12-2012, 01:57 PM
Last Post: seminar details
  Input/output device’s smart paper boy 1 2,134 22-10-2012, 12:56 PM
Last Post: seminar details
  VEBEK: Virtual Energy-Based Encryption And Keying For Wireless Sensor Networks project topics 5 4,967 09-06-2012, 05:34 PM
Last Post: computer girl
  Device Driver Development in Linux smart paper boy 1 1,134 16-02-2012, 04:14 PM
Last Post: seminar paper
  DEVICE DRIVER FOR USB smart paper boy 1 1,379 16-02-2012, 04:13 PM
Last Post: seminar paper
  MONITORING THE APPLICATION LAYER FOR DDOS ATTACK FOR POPULAR WEBSITE seminar surveyer 3 3,324 26-01-2012, 10:19 AM
Last Post: seminar addict
  Remote Device Control Using Speech recognition project topics 2 1,749 25-08-2011, 09:56 AM
Last Post: seminar addict
  TransCrypt: Design of a Secure and Transparent Encrypting File System computer science crazy 1 1,021 11-08-2011, 10:58 AM
Last Post: smart paper boy
  Key Management for Transcrypt smart paper boy 0 701 11-08-2011, 09:31 AM
Last Post: smart paper boy

Forum Jump: