Design and implementation of a forced encryption kernel module

Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Access control mechanisms such as access control lists (ACLs)are often used against divulging of sensitive information. However, when this is implemented as apart of a kernel, if someone stole the storage media, he can easily avoid the access control mechanisms. To complement the defect of the access control mechanisms, we designed and implemented an LKM that applies forced encryption to the data that is transmitted to an external storage media. Advantages of our LKM-based approach include fast encryption in kernel space, easy activation/deactivation of the functionality and the possibility to easily share encrypted files within an authorized group.

Original languageEnglish
Title of host publicationProceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011
Pages607-611
Number of pages5
DOIs
Publication statusPublished - Sep 8 2011
Event2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011 - Seoul, Korea, Republic of
Duration: Jun 30 2011Jul 2 2011

Publication series

NameProceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011

Other

Other2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011
CountryKorea, Republic of
CitySeoul
Period6/30/117/2/11

Fingerprint

Access control
Cryptography
Chemical activation
Defects

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications

Cite this

Furukawa, J., Sakai, A., Nishide, T., Hori, Y., & Sakurai, K. (2011). Design and implementation of a forced encryption kernel module. In Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011 (pp. 607-611). [5976283] (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011). https://doi.org/10.1109/IMIS.2011.68

Design and implementation of a forced encryption kernel module. / Furukawa, Jun; Sakai, Akihiro; Nishide, Takashi; Hori, Yoshiaki; Sakurai, Kouichi.

Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. 2011. p. 607-611 5976283 (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Furukawa, J, Sakai, A, Nishide, T, Hori, Y & Sakurai, K 2011, Design and implementation of a forced encryption kernel module. in Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011., 5976283, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011, pp. 607-611, 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011, Seoul, Korea, Republic of, 6/30/11. https://doi.org/10.1109/IMIS.2011.68
Furukawa J, Sakai A, Nishide T, Hori Y, Sakurai K. Design and implementation of a forced encryption kernel module. In Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. 2011. p. 607-611. 5976283. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011). https://doi.org/10.1109/IMIS.2011.68
Furukawa, Jun ; Sakai, Akihiro ; Nishide, Takashi ; Hori, Yoshiaki ; Sakurai, Kouichi. / Design and implementation of a forced encryption kernel module. Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. 2011. pp. 607-611 (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).
@inproceedings{5b20c1e824354907858e3a89ef0beaec,
title = "Design and implementation of a forced encryption kernel module",
abstract = "Access control mechanisms such as access control lists (ACLs)are often used against divulging of sensitive information. However, when this is implemented as apart of a kernel, if someone stole the storage media, he can easily avoid the access control mechanisms. To complement the defect of the access control mechanisms, we designed and implemented an LKM that applies forced encryption to the data that is transmitted to an external storage media. Advantages of our LKM-based approach include fast encryption in kernel space, easy activation/deactivation of the functionality and the possibility to easily share encrypted files within an authorized group.",
author = "Jun Furukawa and Akihiro Sakai and Takashi Nishide and Yoshiaki Hori and Kouichi Sakurai",
year = "2011",
month = "9",
day = "8",
doi = "10.1109/IMIS.2011.68",
language = "English",
isbn = "9780769543727",
series = "Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011",
pages = "607--611",
booktitle = "Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011",

}

TY - GEN

T1 - Design and implementation of a forced encryption kernel module

AU - Furukawa, Jun

AU - Sakai, Akihiro

AU - Nishide, Takashi

AU - Hori, Yoshiaki

AU - Sakurai, Kouichi

PY - 2011/9/8

Y1 - 2011/9/8

N2 - Access control mechanisms such as access control lists (ACLs)are often used against divulging of sensitive information. However, when this is implemented as apart of a kernel, if someone stole the storage media, he can easily avoid the access control mechanisms. To complement the defect of the access control mechanisms, we designed and implemented an LKM that applies forced encryption to the data that is transmitted to an external storage media. Advantages of our LKM-based approach include fast encryption in kernel space, easy activation/deactivation of the functionality and the possibility to easily share encrypted files within an authorized group.

AB - Access control mechanisms such as access control lists (ACLs)are often used against divulging of sensitive information. However, when this is implemented as apart of a kernel, if someone stole the storage media, he can easily avoid the access control mechanisms. To complement the defect of the access control mechanisms, we designed and implemented an LKM that applies forced encryption to the data that is transmitted to an external storage media. Advantages of our LKM-based approach include fast encryption in kernel space, easy activation/deactivation of the functionality and the possibility to easily share encrypted files within an authorized group.

UR - http://www.scopus.com/inward/record.url?scp=80052362297&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=80052362297&partnerID=8YFLogxK

U2 - 10.1109/IMIS.2011.68

DO - 10.1109/IMIS.2011.68

M3 - Conference contribution

SN - 9780769543727

T3 - Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011

SP - 607

EP - 611

BT - Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011

ER -