Scale and performance in a distributed file system
ACM Transactions on Computer Systems (TOCS)
A proposal for a new block encryption standard
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A proposed mode for triple-DES encryption
IBM Journal of Research and Development
A secure unrestricted advanced systems laboratory
SIGCSE '99 The proceedings of the thirtieth SIGCSE technical symposium on Computer science education
OceanStore: an architecture for global-scale persistent storage
ACM SIGPLAN Notices
OceanStore: an architecture for global-scale persistent storage
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
File system encryption with integrated user management
ACM SIGOPS Operating Systems Review
CryptoCache: a secure sharable file cache for roaming users
EW 9 Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
Building secure file systems out of byzantine storage
Proceedings of the twenty-first annual symposium on Principles of distributed computing
Authenticating Network-Attached Storage
IEEE Micro
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
How to Protect DES Against Exhaustive Key Search
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
The Design and Implementation of a Transparent Cryptographic File System for UNIX
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
How to Manage Persistent State in DRM Systems
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Incremental Unforgeable Encryption
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
A Toolkit for User-Level File Systems
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
Cryptographic access control in a distributed file system
Proceedings of the eighth ACM symposium on Access control models and technologies
Journal of Systems Architecture: the EUROMICRO Journal
Farsite: federated, available, and reliable storage for an incompletely trusted environment
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Remembrance of Data Passed: A Study of Disk Sanitization Practices
IEEE Security and Privacy
Key Management for Encrypted Data Storage in Distributed Systems
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Cryptographic File Systems Performance: What You Don't Know Can Hurt You
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Research and Implement of an Encrypted File System Used to NAS
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Decentralized Authentication Mechanisms for Object-based Storage Devices
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
Enhanced Security Models for Operating Systems: A Cryptographic Approach
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Farsite: federated, available, and reliable storage for an incompletely trusted environment
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Strong Security for Network-Attached Storage
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
A Framework for Evaluating Storage System Security
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
Plutus: Scalable Secure File Sharing on Untrusted Storage
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Securing distributed storage: challenges, techniques, and systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
Ensuring data integrity in storage: techniques and applications
Proceedings of the 2005 ACM workshop on Storage security and survivability
Toward securing untrusted storage without public-key operations
Proceedings of the 2005 ACM workshop on Storage security and survivability
Operating System Level Support for Resource Sharing Across Multiple Domains
HPCASIA '05 Proceedings of the Eighth International Conference on High-Performance Computing in Asia-Pacific Region
Improved proxy re-encryption schemes with applications to secure distributed storage
ACM Transactions on Information and System Security (TISSEC)
Augmenting storage with an intrusion response primitive to ensure the security of critical data
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
The case for transient authentication
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
On incremental file system development
ACM Transactions on Storage (TOS)
Protecting file systems with transient authentication
Wireless Networks
Mobile Device Security Using Transient Authentication
IEEE Transactions on Mobile Computing
Securing sensitive content in a view-only file system
Proceedings of the ACM workshop on Digital rights management
Design, implementation and evaluation of security in iSCSI-based network storage systems
Proceedings of the second ACM workshop on Storage security and survivability
Modeling and improving security of a local disk system for write-intensive workloads
ACM Transactions on Storage (TOS)
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Key management for role hierarchy in distributed systems
Journal of Network and Computer Applications
Auto-pilot: a platform for system software benchmarking
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
Secure deletion for a versioning file system
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Secure data replication over untrusted hosts
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Secure untrusted data repository (SUNDR)
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
SC-CFS: smartcard secured cryptographic file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Understanding data lifetime via whole system simulation
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Shredding your garbage: reducing data lifetime through secure deallocation
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Key management in an encrypting file system
USTC'94 Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1
SC-CFS: smartcard secured cryptographic file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Extending file systems using stackable templates
ATEC '99 Proceedings of the annual conference on USENIX Annual Technical Conference
Cryptography in OpenBSD: an overview
ATEC '99 Proceedings of the annual conference on USENIX Annual Technical Conference
Rapid file system development using ptrace
Proceedings of the 2007 workshop on Experimental computer science
Rapid file system development using ptrace
ecs'07 Experimental computer science on Experimental computer science
GnatDb: a small-footprint, secure database system
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Proceedings of the 2007 ACM workshop on Storage security and survivability
Designing a secure reliable file system for sensor networks
Proceedings of the 2007 ACM workshop on Storage security and survivability
A cryptographic access control architecture secure against privileged attackers
Proceedings of the 2007 ACM workshop on Computer security architecture
Non-volatile memory and disks:: avenues for policy architectures
Proceedings of the 2007 ACM workshop on Computer security architecture
Design, deployment, and use of the DETER testbed
DETER Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007
Zerber: r-confidential indexing for distributed documents
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
VegaFS: file sharing crossing multiple domains
International Journal of High Performance Computing and Networking
A user-level secure grid file system
Proceedings of the 2007 ACM/IEEE conference on Supercomputing
Secure deletion for NAND flash file system
Proceedings of the 2008 ACM symposium on Applied computing
Middleware support for protecting personal data from web based data services
Proceedings of the 4th on Middleware doctoral symposium
Athos: Efficient Authentication of Outsourced File Systems
ISC '08 Proceedings of the 11th international conference on Information Security
Privacy preserving document indexing infrastructure for a distributed environment
Proceedings of the VLDB Endowment
Proceedings of the 15th ACM conference on Computer and communications security
iDataGuard: an interoperable security middleware for untrusted internet data storage
Proceedings of the ACM/IFIP/USENIX Middleware '08 Conference Companion
Privacy analysis and enhancements for data sharing in *nix systems
International Journal of Information and Computer Security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
MPISec I/O: Providing Data Confidentiality in MPI-I/O
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
Customized file systems: an investigator's approach
Proceedings of the 46th Annual Southeast Regional Conference on XX
Information protection via environmental data tethers
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Patient controlled encryption: ensuring privacy of electronic medical records
Proceedings of the 2009 ACM workshop on Cloud computing security
Application containers without virtual machines
Proceedings of the 1st ACM workshop on Virtual machine security
PACISSO: P2P access control incorporating scalability and self-organization for storage systems
PACISSO: P2P access control incorporating scalability and self-organization for storage systems
Fileteller: paying and getting paid for file storage
FC'02 Proceedings of the 6th international conference on Financial cryptography
gVault: a gmail based cryptographic network file system
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Buffer cache level encryption for embedded secure operating system
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
A direction to avoid re-encryption in cryptographic file sharing
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
Group-based proxy re-encryption scheme
ICIC'09 Proceedings of the 5th international conference on Emerging intelligent computing technology and applications
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
A survey of confidential data storage and deletion methods
ACM Computing Surveys (CSUR)
Recovery of flash memories for reliable mobile storages
Mobile Information Systems
Transparent mobile storage protection in trusted virtual domains
LISA'09 Proceedings of the 23rd conference on Large installation system administration
CCCP: secure remote storage for computational RFIDs
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Protecting confidential data on personal computers with storage capsules
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
On securing untrusted clouds with cryptography
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
A multi-user steganographic file system on untrusted shared storage
Proceedings of the 26th Annual Computer Security Applications Conference
Quality of security adaptation in parallel disk systems
Journal of Parallel and Distributed Computing
Strong security for network-attached storage
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
A framework for evaluating storage system security
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
Enabling security in cloud storage SLAs with CloudProof
USENIXATC'11 Proceedings of the 2011 USENIX conference on USENIX annual technical conference
jVPFS: adding robustness to a secure stacked file system with untrusted local storage components
USENIXATC'11 Proceedings of the 2011 USENIX conference on USENIX annual technical conference
An auto-delegation mechanism for access control systems
STM'10 Proceedings of the 6th international conference on Security and trust management
An NFSv4-Based security scheme for NAS
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Key management for role hierarchy in distributed systems
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Block-Level storage security architectures
ICCSA'06 Proceedings of the 6th international conference on Computational Science and Its Applications - Volume Part I
An efficient way to build secure disk
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Encrypted watermarks and linux laptop security
WISA'04 Proceedings of the 5th international conference on Information Security Applications
DRMFS: A file system layer for transparent access semantics of DRM-protected contents
Journal of Systems and Software
Protecting mass data basing on small trusted agent
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Difference set attacks on conjunctive keyword search schemes
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Secure key-updating for lazy revocation
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Key derivation algorithms for monotone access structures in cryptographic file systems
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
An implementation and evaluation of online disk encryption for windows systems
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Oblivious conjunctive keyword search
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Integration of a cryptographic file system and access control
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
A cloud provider-agnostic secure storage protocol
CRITIS'10 Proceedings of the 5th international conference on Critical Information Infrastructures Security
GPUstore: harnessing GPU computing for storage systems in the OS kernel
Proceedings of the 5th Annual International Systems and Storage Conference
Eternal sunshine of the spotless machine: protecting privacy with ephemeral channels
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
Iris: a scalable cloud file system with efficient integrity checks
Proceedings of the 28th Annual Computer Security Applications Conference
ASCDS: a smartphone confidential data storage scheme
International Journal of Wireless and Mobile Computing
A secure file sharing service for distributed computing environments
The Journal of Supercomputing
Hi-index | 0.00 |
Although cryptographic techniques are playing an increasingly important role in modern computing system security, user-level tools for encrypting file data are cumbersome and suffer from a number of inherent vulnerabilities. The Cryptographic File System (CFS) pushes encryption services into the file system itself. CFS supports secure storage at the system level through a standard Unix file system interface to encrypted files. Users associate a cryptographic key with the directories they wish to protect. Files in these directories (as well as their pathname components) are transparently encrypted and decrypted with the specified key without further user intervention; cleartext is never stored on a disk or sent to a remote file server. CFS can use any available file system for its underlying storage without modification, including remote file servers such as NFS. System management functions, such as file backup, work in a normal manner and without knowledge of the key.This paper describes the design and implementation of CFS under Unix. Encryption techniques for file system-level encryption are described, and general issues of cryptographic system interfaces to support routine secure computing are discussed.