Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

An implementation study of a ghost drive: Hidden file store in a filesystem

Full metadata record
DC Field Value Language
dc.contributor.authorLee, E.-
dc.contributor.authorLee, J.-
dc.contributor.authorKang, H.-
dc.contributor.authorKim, K.-
dc.contributor.authorKim, S.-R.-
dc.contributor.authorShin, S.Y.-
dc.date.available2019-04-10T10:37:12Z-
dc.date.created2018-04-17-
dc.date.issued2012-
dc.identifier.isbn9781450308571-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/32986-
dc.description.abstractRecently, it becomes increasingly important to secure user private data in mobile devices. To protect user private data, one possible approach is to implement a secure file storage in the mobile devices based on mandatory access control (MAC), but the device manufacturers seldom implement it because of high pressure of time-to-market, frequent version upgrade of the operating system, and no unanimous agreement in the MAC standard software. In this paper, we propose an implementation study of a secure file storage, called a ghost drive, which can facilitate the implementation of MAC in the mobile devices by unburdening the manufacturers from aggressive instrumentation of the whole operating system. Since our implementation is in form of a loadable kernel module, separated from the main kernel, it can be deployed even to commercial mobile devices already in use by installing it over the air. Our experiments show that the performance of our secure storage implementation is not worse than the original unmodified implementation. © 2012 ACM.-
dc.relation.isPartOfProceedings of the ACM Symposium on Applied Computing-
dc.titleAn implementation study of a ghost drive: Hidden file store in a filesystem-
dc.typeConference-
dc.identifier.doi10.1145/2245276.2232068-
dc.type.rimsCONF-
dc.identifier.bibliographicCitation27th Annual ACM Symposium on Applied Computing, SAC 2012, pp.1796 - 1798-
dc.description.journalClass2-
dc.identifier.scopusid2-s2.0-84863581380-
dc.citation.conferenceDate2012-03-26-
dc.citation.conferencePlaceTrento-
dc.citation.endPage1798-
dc.citation.startPage1796-
dc.citation.title27th Annual ACM Symposium on Applied Computing, SAC 2012-
dc.contributor.affiliatedAuthorKim, K.-
dc.type.docTypeConference Paper-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > Department of Smart Systems Software > 2. Conference Papers

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Kang hee photo

Kim, Kang hee
College of Information Technology (Department of Smart Systems Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE