A cryptographic file system for UNIX
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A System-Assisted Disk I/O Simulation Technique
MASCOTS '99 Proceedings of the 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Cost-Efficient Memory Architecture Design of NAND Flash Memory Embedded Systems
ICCD '03 Proceedings of the 21st International Conference on Computer Design
Real-time garbage collection for flash-memory storage systems of real-time embedded systems
ACM Transactions on Embedded Computing Systems (TECS)
A Framework for Evaluating Storage System Security
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
Efficient identification of hot data for flash memory storage systems
ACM Transactions on Storage (TOS)
Storage-based intrusion detection: watching storage activity for suspicious behavior
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Portable Storage and Data Loss
IEEE Internet Computing
Efficient signature based malware detection on mobile devices
Mobile Information Systems
Secure authentication in heterogeneous wireless networks
Mobile Information Systems - Mobile Systems and Applications
Online maintenance of very large random samples on flash storage
Proceedings of the VLDB Endowment
Design and evaluation of reliable data transmission protocol in wireless sensor networks
Mobile Information Systems - Information Assurance and Advanced Human-Computer Interfaces
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Composite RAID for rapid prototyping data grid
International Journal of Web and Grid Services
Mobile Information Systems
Detection of cross site scripting attack in wireless networks using n-Gram and SVM
Mobile Information Systems - Advances in Network-Based Information Systems
A safe exit algorithm for continuous nearest neighbor monitoring in road networks
Mobile Information Systems
E-books on the mobile e-reader
Mobile Information Systems
Hi-index | 0.00 |
As the mobile appliance is applied to many ubiquitous services and the importance of the information stored in it is increased, the security issue to protect the information becomes one of the major concerns. However, most previous researches focused only on the communication security, not the storage security. Especially, a flash memory whose operational characteristics are different from those of HDD is used increasingly as a storage device for the mobile appliance because of its resistance to physical shock and lower power requirement. In this paper, we propose a flash memory management scheme targeted for guaranteeing the data integrity of the mobile storage. By maintaining the old data specified during the recovery window, we can recover the old data when the mobile appliance is attacked. Also, to reduce the storage requirement for the recovery, we restrict the number of versions to be copied, called Degree of Integrity (DoI). Especially, we consider both the reclaim efficiency and the wear leveling which is a unique characteristic of the flash memory. Based on the performance evaluation, we confirm that the proposed scheme can be acceptable to many applications as a flash memory management scheme for improving data integrity.