An implementation study of a ghost drive: Hidden file store in a filesystem
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, E. | - |
dc.contributor.author | Lee, J. | - |
dc.contributor.author | Kang, H. | - |
dc.contributor.author | Kim, K. | - |
dc.contributor.author | Kim, S.-R. | - |
dc.contributor.author | Shin, S.Y. | - |
dc.date.available | 2019-04-10T10:37:12Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2012 | - |
dc.identifier.isbn | 9781450308571 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/32986 | - |
dc.description.abstract | Recently, it becomes increasingly important to secure user private data in mobile devices. To protect user private data, one possible approach is to implement a secure file storage in the mobile devices based on mandatory access control (MAC), but the device manufacturers seldom implement it because of high pressure of time-to-market, frequent version upgrade of the operating system, and no unanimous agreement in the MAC standard software. In this paper, we propose an implementation study of a secure file storage, called a ghost drive, which can facilitate the implementation of MAC in the mobile devices by unburdening the manufacturers from aggressive instrumentation of the whole operating system. Since our implementation is in form of a loadable kernel module, separated from the main kernel, it can be deployed even to commercial mobile devices already in use by installing it over the air. Our experiments show that the performance of our secure storage implementation is not worse than the original unmodified implementation. © 2012 ACM. | - |
dc.relation.isPartOf | Proceedings of the ACM Symposium on Applied Computing | - |
dc.title | An implementation study of a ghost drive: Hidden file store in a filesystem | - |
dc.type | Conference | - |
dc.identifier.doi | 10.1145/2245276.2232068 | - |
dc.type.rims | CONF | - |
dc.identifier.bibliographicCitation | 27th Annual ACM Symposium on Applied Computing, SAC 2012, pp.1796 - 1798 | - |
dc.description.journalClass | 2 | - |
dc.identifier.scopusid | 2-s2.0-84863581380 | - |
dc.citation.conferenceDate | 2012-03-26 | - |
dc.citation.conferencePlace | Trento | - |
dc.citation.endPage | 1798 | - |
dc.citation.startPage | 1796 | - |
dc.citation.title | 27th Annual ACM Symposium on Applied Computing, SAC 2012 | - |
dc.contributor.affiliatedAuthor | Kim, K. | - |
dc.type.docType | Conference Paper | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.