defy a deniable encrypted file system for log structured
play

DEFY: A Deniable, Encrypted File System for Log Structured Storage - PowerPoint PPT Presentation

DEFY: A Deniable, Encrypted File System for Log Structured Storage WRITTEN BY: PRESENTED BY: TIMOTHY PETERS NICHOLAS BURTON MARK GONDREE ZACHARY PETERSON What is encryption? Why hide encryption? Previous Work on the Matter u Anderson and


  1. DEFY: A Deniable, Encrypted File System for Log Structured Storage WRITTEN BY: PRESENTED BY: TIMOTHY PETERS NICHOLAS BURTON MARK GONDREE ZACHARY PETERSON

  2. What is encryption?

  3. Why hide encryption?

  4. Previous Work on the Matter u Anderson and others …

  5. Previous Work on the Matter u Anderson and others … u StegFS, McDonald and Kuhn

  6. Previous Work on the Matter u Anderson and others … u StegFS, McDonald and Kuhn u StegFS, Pang, Tan, and Zhou

  7. Previous Work on the Matter u Anderson and others … u StegFS, McDonald and Kuhn u StegFS, Pang, Tan, and Zhou u DenFS, Gasti and others

  8. Previous Work on the Matter u Anderson and others … u StegFS, McDonald and Kuhn u StegFS, Pang, Tan, and Zhou u DenFS, Gasti and others u Mobiflage, Skillen and Mannan

  9. Previous Work on the Matter u Anderson and others … u StegFS, McDonald and Kuhn u StegFS, Pang, Tan, and Zhou u DenFS, Gasti and others u Mobiflage, Skillen and Mannan u WhisperYAFFS

  10. Why is DEFY different?

  11. Main component of DEFY?

  12. Main component of DEFY? YAFFS

  13. YAFFS (Yet Another Flash File System)

  14. YAFFS (Yet Another Flash File System) u Read and Write at Page level, delete at Block level (NAND Flash Architecture)

  15. YAFFS (Yet Another Flash File System) u Read and Write at Page level, delete at Block level (NAND Flash Architecture) u Per-page Out Of Bounds (OOB) Area for MetaData (NAND Flash Architecture)

  16. YAFFS (Yet Another Flash File System) u Read and Write at Page level, delete at Block level (NAND Flash Architecture) u Per-page Out Of Bounds (OOB) Area for MetaData (NAND Flash Architecture) u Dynamic Wear Leveling (NAND Flash Architecture)

  17. YAFFS (Yet Another Flash File System) u Read and Write at Page level, delete at Block level (NAND Flash Architecture) u Per-page Out Of Bounds (OOB) Area for MetaData (NAND Flash Architecture) u Dynamic Wear Leveling (NAND Flash Architecture) u Log Structured File System

  18. Design Requirements

  19. Design Requirements u Deniability Levels

  20. Design Requirements u Deniability Levels u Secure Deletion

  21. Design Requirements u Deniability Levels u Secure Deletion u Authentication Encryption

  22. Design Requirements u Deniability Levels u Secure Deletion u Authentication Encryption u Minimizing Data Loss

  23. Design Requirements u Deniability Levels u Secure Deletion u Authentication Encryption u Minimizing Data Loss u Wear Leveling

  24. Design Requirements u Deniability Levels u Secure Deletion u Authentication Encryption u Minimizing Data Loss u Wear Leveling u Easy Deployment

  25. Design Overview

  26. Design Overview – Deniability Levels u Each level is associated with a Level Directory, which exists under the root directory. u All files in each level are within its given directory. u Each level has its own name and key, derived from user password

  27. Design Overview – Authentication Encryption

  28. Design Overview – Secure Deletion u All or Nothing transform u Single parts of ciphertext cannot be decrypted u Only the entire cyphertext can be decrypted u To achieve secure deletion, part of the ciphertext is deleted, making it impossible to get back the original data.

  29. Design Overview – Secure Deletion & Authentication Encryption

  30. OOD Area and MetaData

  31. OOD Area and MetaData

  32. Design Overview – Minimized Data Loss u Any encrypted page will be viewed as free by the page allocator u DENY uses 3 methods to mitigate this problem 1. When higher levels are revealed, all lower levels are as well 2. One level per block policy 3. DEFY writes checkpoints in a way the prevents overwriting of higher levels

  33. Design Overview – Minimized Data Loss

  34. Security Analysis

  35. Security Analysis

  36. Security Analysis

  37. Security Analysis

  38. Overhead

  39. Questions ?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend