Design and implementation of a forced encryption kernel module

Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Access control mechanisms such as access control lists (ACLs)are often used against divulging of sensitive information. However, when this is implemented as apart of a kernel, if someone stole the storage media, he can easily avoid the access control mechanisms. To complement the defect of the access control mechanisms, we designed and implemented an LKM that applies forced encryption to the data that is transmitted to an external storage media. Advantages of our LKM-based approach include fast encryption in kernel space, easy activation/deactivation of the functionality and the possibility to easily share encrypted files within an authorized group.

Original languageEnglish
Title of host publicationProceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011
Pages607-611
Number of pages5
DOIs
Publication statusPublished - Sep 8 2011
Event2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011 - Seoul, Korea, Republic of
Duration: Jun 30 2011Jul 2 2011

Publication series

NameProceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011

Other

Other2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011
CountryKorea, Republic of
CitySeoul
Period6/30/117/2/11

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Design and implementation of a forced encryption kernel module'. Together they form a unique fingerprint.

Cite this