The Community for Technology Leaders
RSS Icon
Boston, MA, USA
April 2, 2004 to April 2, 2004
ISBN: 0-7695-2065-0
pp: 572
Xuan Zhou , National University of Singapore
HweeHwa Pang , Institute for Infocomm Research, Singapore
Kian-Lee Tan , National University of Singapore
To support ubiquitous computing, the underlying data have to be persistent and available anywhere-anytime. The data thus have to migrate from devices local to individual computers, to shared storage volumes that are accessible over open network. This potentially exposes the data to heightened security risks. We propose two mechanisms, in the context of a steganographic file system, to mitigate the risk of attacks initiated through analyzing data accesses from user applications. The first mechanism is intended to counter attempts to locate data through updates in between snapshots - in short, update analysis. The second mechanism prevents traffic analysis - identifying data from I/O traffic patterns. We have implemented the first mechanism on Linux and conducted experiments to demonstrate its effectiveness and practicality. Simulation results on the second mechanism also show its potential for real world applications.
Xuan Zhou, HweeHwa Pang, Kian-Lee Tan, "Hiding Data Accesses in Steganographic File System", ICDE, 2004, Proceedings. 20th International Conference on Data Engineering, Proceedings. 20th International Conference on Data Engineering 2004, pp. 572, doi:10.1109/ICDE.2004.1320028
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool