Prototype Design of Self-Securing Portable Storage Device

Article Preview

Abstract:

Embedding the security mechanism into the device is the core of self-securing, on purpose to provide the device with the ability of self-defense. Currently, security of portable storage device is commonly depends on the host, which makes the data easy to be attacked or stolen. Researches on self-securing mechanism on portable device are few. In order to improve the safety of those devices, we proposed the prototype design of self-securing portable storage device based on the framework of ARM+Linux. Combined with access control, intrusion detection based on storage and data encryption/decryption, it can protect data availability, integrity and confidentiality effectively. Since we have expanded researches on self-securing mechanism of portable storage devices, this prototype design is promising to be one kind of trend of intelligent storage.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3911-3914

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Christopher Lum, Jiri Schindler, Gregory R. Ganger, David F. Nagle, and Erik Riedel. Towards higher disk head utilization: Extracting \free" bandwidth from busy disk drives. Symposium on Operating Systems Design and Implementation (San Deigo, CA, 23-25 October 2000). ACM, October (2000).

DOI: 10.21236/ada382318

Google Scholar

[2] Josh MacDonald. File system support for delta compression. Masters thesis. Department of Electrical Engineering and Computer Science, University of California at Berkeley, (2000).

Google Scholar

[3] John D. Strunk, Garth R. Goodson, Adam G. Pennington, Craig A.N. Soules, Gregory R. Ganger. Intrusion Detection, Diagnosis, and Recovery with Self-Securing Storage. CMU-CS-02-140. May (2002).

DOI: 10.21236/ada461216

Google Scholar

[4] Craig A. N. Soules, Garth R. Goodson, John D. Strunk, and Gregory R. Ganger. Metadata efficiency in a comprehensive versioning file system. Technical report CMU–CS–02–145. Carnegie Mellon University, (2002).

DOI: 10.21236/ada461077

Google Scholar

[5] Butler K. McLanghlin S, McDaniel P. Non-volatile Memory and Disks: Avenues for Policy Architectures[C]. Proc of the 1st Computer Security Architecture Workshop. Alexandria, VA, USA: IEEE Computer Society, 2007: 51-57.

DOI: 10.1145/1314466.1314479

Google Scholar

[6] Strunk J D. Self-securing Storage: Protecting Data in Compromised Systems[C]. Proc of the 4th Symposium on Operating Systems Design and Implementation[S. 1. ]: IEEE Computer Society 2000: 195-209.

Google Scholar

[7] S. Chen, B. Mulgrew, and P. M. Grant, A clustering technique for digital communications channel equalization using radial basis function networks, IEEE Trans. on Neural Networks, vol. 4, pp.570-578, July (1993).

DOI: 10.1109/72.238312

Google Scholar

[8] J. U. Duncombe, Infrared navigation—Part I: An assessment of feasibility, IEEE Trans. Electron Devices, vol. ED-11, pp.34-39, Jan. (1959).

Google Scholar

[9] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, and M. Miller, Rotation, scale, and translation resilient public watermarking for images, IEEE Trans. Image Process., vol. 10, no. 5, pp.767-782, May (2001).

DOI: 10.1109/83.918569

Google Scholar

[10] WYLIE J J, BIGRIGGMW, STRUNK JD, et al. Survivable information storage systems[ J]. IEEE Computer Society, 2000, 33(8): 61-68.

Google Scholar

[11] WYLIE J J, BAKKALOGLUM, PANDURANGAN V, et al. Selecting the right data distribution scheme for a survivable storage system, CMU-CS-01-120 [ R ]. Pittsburgh: Carnegie Mellon University, 2001: 1-10.

Google Scholar

[12] PENNINGTON A, STRUNK J, GRIFFIN J, et al. Storage-based intrusion detection: watching storage activity for suspicious behavior, CMU-CS-02-179[R]. Pittsburgh: Carnegie Mellon University, 2002: 1-11.

DOI: 10.21236/ada461142

Google Scholar

[13] STRUNK JD, GOODSONG R, PENNINGTONAG, et al. Intrusion detection, diagnosis, and recovery with self-securing storage, CMU-CS-02-140[R]. Pittsburgh: Carnegie Mellon University, 2002: 1-9.

Google Scholar

[14] RIEDEL E, FALOUTSOS C, GIBSON G A, et al. Active disks for large-scale data processing[J]. Computer, 2001, 34(6): 68-74.

DOI: 10.1109/2.928624

Google Scholar

[15] RIEDEL E, FALOUTSOS C, NAGLE D. Active disk architecture for databases, CMU-CS-00-145 [R]. Pittsburgh: Carnegie Mellon University, 2002: 1-12.

Google Scholar

[16] RUEDEL E, FALOUTSOS C, GANGER G R, etal. Data mining on an OLTP system (nearly) for free[ J]. ACM S IGMOD Record, 2000, 29(2): 13-21.

DOI: 10.1145/335191.335375

Google Scholar

[17] RIEDEL E, GIBSON G. Active disks-remote execution for network-attached storage, CMU-CS-99-177[R]. Pittsburgh: Carnegie Mellon University, 1999: 1-11.

DOI: 10.21236/ada341735

Google Scholar

[18] RIEDEL E, GIBSON G. Active storage for large-scale data mining and multimedia[C] /Proc of the 24th International Conference on Very Large Databases. San Francisco: Morgan Kaufmann Publishers, 1998: 62-73.

Google Scholar

[19] RIEDEL E, GIBSON G. Active disks: remote execution for network-attached storage, CMU-CS-97-198[R]. Pittsburgh: Carnegie Mellon University, 1997: 1-9.

DOI: 10.21236/ada341735

Google Scholar