Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Creating Secure File Systems in Open-Source Operating Systems

View through CrossRef
The relevance of this study is determined by insecure data storage on personal computers, as it is the main operating system that performs authentication and file access control. Bypassing these security rules is possible in case of using another open-source operating system on the same personal computer. The aim of this work is the research and development of file encryptors, disk encryptors and file system encryptors. Each of them has its shortcomings which manifest themselves during development. Combining the advantages of file encryptors and file system encryptors helped to overcome those shortcomings. The userspace filesystem library was used for this purpose. The study involved the methods aimed at designing and developing the Udev daemon file system for Linux using the OpenSSL library. The file system design was mathematically modelled and formally verified through a test parser. The file system also has its own authentication and authorization procedures to provide uniform access across multiple operating systems. The Udev daemon file system is the result of this work. Each file is encrypted with a separate key to protect against cryptanalysis. This key is encrypted with the owner’s private key, thereby enabling him/her to change the ownership. The passphrase is used to decrypt the user’s private key. The developed file system has passed authentication and access control testing successfully. The file system shows best performance with file sizes 1 KB to 256 MB. Encryption-caused performance degradation was also measured and found to be within acceptable limits. This Udev daemon stackable file system is available for all Unix clones with OpenSSL libraries. The prospects for further work are the development of a file system using several combined methods from a list of existing design and development methods for file systems.
World Scientific and Engineering Academy and Society (WSEAS)
Title: Creating Secure File Systems in Open-Source Operating Systems
Description:
The relevance of this study is determined by insecure data storage on personal computers, as it is the main operating system that performs authentication and file access control.
Bypassing these security rules is possible in case of using another open-source operating system on the same personal computer.
The aim of this work is the research and development of file encryptors, disk encryptors and file system encryptors.
Each of them has its shortcomings which manifest themselves during development.
Combining the advantages of file encryptors and file system encryptors helped to overcome those shortcomings.
The userspace filesystem library was used for this purpose.
The study involved the methods aimed at designing and developing the Udev daemon file system for Linux using the OpenSSL library.
The file system design was mathematically modelled and formally verified through a test parser.
The file system also has its own authentication and authorization procedures to provide uniform access across multiple operating systems.
The Udev daemon file system is the result of this work.
Each file is encrypted with a separate key to protect against cryptanalysis.
This key is encrypted with the owner’s private key, thereby enabling him/her to change the ownership.
The passphrase is used to decrypt the user’s private key.
The developed file system has passed authentication and access control testing successfully.
The file system shows best performance with file sizes 1 KB to 256 MB.
Encryption-caused performance degradation was also measured and found to be within acceptable limits.
This Udev daemon stackable file system is available for all Unix clones with OpenSSL libraries.
The prospects for further work are the development of a file system using several combined methods from a list of existing design and development methods for file systems.

Related Results

Test file
Test file
Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file....
File system metadata virtualization
File system metadata virtualization
The advance of computing systems has brought new ways to use and access the stored data that push the architecture of traditional file systems to its limits, making them inadequate...
Perancangan Aplikasi Kompresi File MP3 Dengan Menggunakan Algoritma Lempel Ziv Welch (LZW)
Perancangan Aplikasi Kompresi File MP3 Dengan Menggunakan Algoritma Lempel Ziv Welch (LZW)
File berbentuk suara  banyak digunakan dalam kegiatan sehari-hari orang dalam mendukung aktifitasnya seperti penggunaan file suara dalam aplikasi pemutar musik baik secara daring m...
A New Secure Chip File Access Method Based on Security Level Information
A New Secure Chip File Access Method Based on Security Level Information
This paper analyzes the shortcomings of two commonly used secure chip file access methods and proposes a new secure chip file access method based on security level information. The...
Forced pirates and the ethics of digital film
Forced pirates and the ethics of digital film
PurposeWith the rise of the internet, the act of sharing copyrighted material has received a lot of attention, culminating in a flood of lawsuits against file‐sharers as well as st...
PENERAPAN ALGORITMA INTERPOLATIVE CODING UNTUK KOMPRESI FILE AUDIO
PENERAPAN ALGORITMA INTERPOLATIVE CODING UNTUK KOMPRESI FILE AUDIO
The size of the audio file can affect the time of sending data to be long and can cause waste of storage space. Therefore, compression is performed to compress the contents of the ...

Back to Top