A cryptographic file system for UNIX
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Windows NT file system internals: a developer's guide
Windows NT file system internals: a developer's guide
Inside Microsoft Windows 2000
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
Linux NFS and Automounter Administration (Craig Hunt Linux Library Series)
Linux NFS and Automounter Administration (Craig Hunt Linux Library Series)
A Framework for Evaluating Storage System Security
FAST '02 Proceedings of the Conference on File and Storage Technologies
The Design and Implementation of a Transparent Cryptographic File System for UNIX
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
Fast Indexing: Support for Size-Changing Algorithms in Stackable File Systems
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
StegFS: A Steganographic File System for Linux
IH '99 Proceedings of the Third International Workshop on Information Hiding
NFS tricks and benchmarking traps
ATEC '03 Proceedings of the annual conference on USENIX Annual Technical Conference
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
FiST: a language for stackable file systems
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
PenguinoMeter: a new file-I/O benchmark for Linux®
ALS '01 Proceedings of the 5th annual Linux Showcase & Conference - Volume 5
Secure deletion myths, issues, and solutions
Proceedings of the second ACM workshop on Storage security and survivability
Extending ACID semantics to the file system
ACM Transactions on Storage (TOS)
Secure deletion for a versioning file system
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Rapid file system development using ptrace
Proceedings of the 2007 workshop on Experimental computer science
Rapid file system development using ptrace
ecs'07 Experimental computer science on Experimental computer science
Stateless data concealment for distributed systems
Journal of Computer and System Sciences
Integrity checking in cryptographic file systems with constant trusted storage
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
A nine year study of file system and storage benchmarking
ACM Transactions on Storage (TOS)
Integrity Protection for Revision Control
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Information protection via environmental data tethers
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Buffer cache level encryption for embedded secure operating system
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
A survey of confidential data storage and deletion methods
ACM Computing Surveys (CSUR)
Towards a secure and efficient system for end-to-end provenance
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
An implementation and evaluation of online disk encryption for windows systems
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Integration of a cryptographic file system and access control
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
TMS: a trusted mail repository service using public storage clouds
Proceedings of the 8th Workshop on Middleware for Next Generation Internet Computing
Hi-index | 0.00 |
Securing data is more important than ever, yet cryptographicfile systems still have not received wide use. Onebarrier to the adoption of cryptographic file systems is thatthe performance impact is assumed to be too high, but infact is largely unknown. In this paper we first survey availablecryptographic file systems. Second, we perform a performancecomparison of a representative set of the systems,emphasizing multiprogrammed workloads. Third, we discussinteresting and counterintuitive results. We show theoverhead of cryptographic file systems can be minimal formany real-world workloads, and suggest potential improvementsto existing systems. We have observed not only generaltrends with each of the cryptographic file systems wecompared but also anomalies based on complex interactionswith the operating system, disks, CPUs, and ciphers.