Abstract
The security of data is more essential nowadays than ever
due to the increase in the interconnection of networks and the communication
using multiple media and interconnected devices. The evolution of data threats
and the issue of cyber security is also another thing that is making the
protection of data and secure communications to be more important nowadays than
ever. Despite the fact that the cryptographic file systems have been around for
quite long, they have not received the desired attention and application. One of the hindrances to the adoption of the
file cryptographic file systems is that their performance is effect is assumed
to be very high and unknown. The article
is intended to discus about the types of cryptographic file systems,
performance comparisons, counterintuitive results and other areas regarding the
improvements of the available cryptographic file systems.
Introduction
The security of data is more important because it is the
data that determines the business continuity of organizations. Data loss can
have a negative implication to the operations of companies. As the Web is becoming more pervasive, the
security attacks have also grown. There
are many available studies that show that the many organizations have lost
their revenues via the security breaches.
Many systems n methods have also been developed to address the issue of
data confidentiality. Three factors are key when analyzing the security
systems, and that factor secludes the security, performance, and the
ease-of-use. Those concerns seem to compete; for instance, if a security system
is too difficult to use, it is likely that the users will circumvent it. Furthermore, when an encryption system seems
to slow down the work of the users, they simply turn it off. Even though the analysis of cryptographic
file systems is of paramount importance, a real-world performance comparison
has not yet been made.
Cryptographic
File Systems
Several cryptographic file systems exist. They vary from the bloc-based to native disk
fie systems, stackable file systems, and native disk systems through to
encryption applications. Each of those
cryptographic approaches has its merits and demerits, and that is discussed in
more detail below.
Block-Based Encryption Systems
The block-based file systems do operate below the level of
file systems, and they are useful in encrypting a single disk block at a time.
The advantage of that is that they do not require knowing the file system
residing on the top of them, and they can be useful in swapping the partitions
that may need to gain access to raw partitions. Furthermore, they do not show
the information of individual files or the directory structure. The cryptoloop is a Linux loopback device
that serves as an example of the block device that is used for data
transformation before being written and it is read from native file to offer
encryption (Wright, Martino & Zadok, 2003).
The Linux kernels also have incorporated a cryptographic framework known
as CryptoAPI used to export uniform interfaces for all the hashes and
ciphers. The Cryptoloop driver and the
IPSec use the facilities.
Three backing stores for the loopback driver do exist including
the preallocated file, raw device, and a sparse backing. The usage of files rather than devices adds
performance consequences such as cutting down the cache by half as the blocks
are stored in the memory in the form of encrypted and unencrypted data. The methods mentioned above have each its
advantages and drawbacks associated with ease-of-use and security. The usage of
preallocated file has been found to be more secure as compared to the use of
sparse files because an attacker may not have the ability to differentiate the
random data stored in the file from the encrypted data (Yun, Shi & Kim,
2009). The use of the preallocated file, however, requires the spaces to be set
aside to store the encrypted files before encryption. The usage of the sparse backing store al
omens that there is no need to ensure the preallocation of space for the
encrypted data although it unravels more about the file system structure.
Disk-Based cryptographic file
systems
The disk-based systems used for data encryption are placed
in a higher encryption level as compared to the block-based systems (Blaze,
1993). Those file systems can access all
per directory and per file data thereby making it possible for them to carry
out complex authentication and authorization of access apart from controlling
the layout of data. That mean that these types of cryptographic file systems
limit the amount of information an attacker can access concerning the file size
and its owner although those attributes are often revealed so as to preserve
the disk structure of the file systems. Another thing with these types of
cryptographic file systems is that there is no layer of indirection, meaning
that these types of cryptographic file systems have a better performance than
the techniques discussed in this article including the loop devices.
Microsoft uses an Encryption File System that has a basis
son the NT kernel. The EFS is n extension of NTFS, and it leverages the Windows
authentication techniques and the Windows ACLs. The EFS is tightly coupled to
the DLLs for the purpose of performing the encryption as well as the Local
Security Authentication Server used to accomplish authentication (Wright,
Martino & Zadok, 2003). The SegFS is
also another system that uses steganography and encryption. If the attackers
investigate the system, they can only know that there is data that is hidden
although they cannot access that data. They do not have the knowledge of the
contents of the hidden data as well as the extent of hidden data. In this case,
an Ext2 kernel driver is used to store a separate block-allocation table for
each level of security. One cannot know the number of security levels unless
one has a key to each level of security.
Although the StegFS does ensure the deniability of knowing the existence
of data, it has performance degradation by a factor of 6-196 that consequently
makes this method impractical for many applications.
Networked Loopback Cryptographic
File Systems
The networked file systems abbreviated as NBFS work at a
higher level of abstraction as compared to the disk-based cryptographic file
systems. Therefore, BNFSs have the capacity of controlling the on-disk file
layout. These types of encryption systems have two main advantages including
the ability to operate on top of the file systems, and the fact that they are
more portable when compared to the disk-based cryptographic file systems
(Wright, Martino & Zadok, 2003). The main disadvantage of these file
systems is that their performance and security is low. The fact that each request
needs to travel over a network stack, these type of cryptographic file systems
require more data companies hence making performance top suffer. These types of file encryption systems are
less secure as they are vulnerable to all weaknesses of the network protocols
underlying them.
The examples of these types of cryptographic file systems
include the CFS that implements a user-level NFS server and the TCFS that
implements a kernel-mode NFS client. In
the case of a CFS, the specification of the key and the cipher takes place
during the time when the encrypted directories are being created (Wright,
Martino & Zadok, 2003). The usage of the CFS daemon offer the owners of
files with access to the encrypted data through an attach command. After the daemon verifies the key and the
user ID, a directory is created in the mount point directory to serve as an
unencrypted window through which the user can access the encrypted data
(McDonald & Kuhn, 1999). When the directory has been attached, the user can
gain access to it just like any directory.
The CFS has a wide choice of in-built ciphers. The main problem with
this approach is that the performance is poor.
Because CFS this approach runs in user mode, several context switches,
and data copies have to be performed between the user space and the kernel.
The TCFS, on the other hand, is a cryptographic file system
implemented as a modified NFS client with some modifications. Because it is being used together with the
NFS server, this type of networked loopback file system works transparently
with a remote file system thereby eliminating the need of having particular
attach and detach commands (Blaze, 1993).
The encryption of data would require a user to create an encrypted
attribute on the directories as well as the files within the network file
system mount data. It integrates with
LINUX authentication system instead of requiring a separate passphrase. TCFS uses the database to store the group
keys as well as the encrypted user. It
can limit the group access to the files and directories to a given number of
LINUX users, and it also allows some mechanism for reconstructing the group
keys in case a member becomes unavailable.
It can work with any network interface as well as remote users.
The Stackable Cryptographic File
Systems
The stackable file systems are the combination of the
disk-based file systems as well as the loopback network files systems. These types of cryptographic file systems can
operate on top of the file systems, and there is no need to copy the data
through the network stack across the user-kernel borders (Wright, Martino &
Zadok, 2003). They are also portable thereby making it possible to be used by
several operating systems. There are two examples of the stackable files systems
including the Crypts and the NCryptFS. The CryptFS are a part of the FiST
toolkit, and they were never designed to be secure, but they apply the concept
of the FiST. They can only implement one
cipher and a limited scheme for key management.
On the other hand, the NCcryptFS are stackable cryptographic file
systems whose design is to balance the security, performance and the
convenience (Wright, Martino & Zadok, 2003). They allow the system
administrators to customize them according to their specific requirements.
Applications
There are applications that are useful for accomplishing
file encryption, and GPG of the crypt are examples of such application residing
on the file system. The applications are
however inconvenient to the users because every time a user wants to access a
given file, they have to encrypt manually or decrypt the file (McDonald &
Kuhn, 1999). That is to say; the
solution requires more user interaction to encrypt if decrypt the file making
it possible to make mistakes that in turn result in damaging the files or
leaking the sensitive data. Also, a file
may be in storage in the form of a clear text on a disk as the user is working
on the same. The file encryption can
also have integration into the applications, although that shifts the task from
the users to the application programmers.
Often, the application developers would not want to take the
responsibility of extra time and effort implementing features that they know
very well that it only a few users are likely to need them (Pletka &
Cachin, 2007). Even though encryption is
a crucial feature that needs to have amalgamation into the applications being
developed; there are two major disadvantages to that approach. For one, each extra application on which a
user relies to function correctly impacts the performance of the system. The other disadvantage of the approach is
that each application may implement encryption in a different way thereby
making the use of file systems in separate programs difficult.
Cryptographic
File Systems Design
One of the implementations of cryptographic file systems
takes place via the use of a file system that is kernel-resident. That kind of implementation mode is useful in
the CryptFS. The usage of such an implementation model makes it possible to mount
any file system to the directory and on top of the file system like the UFS or
the NFS. The model also eliminates the
need to have additional daemon processes to exploit so as to gain access to the
files or possibly to the system. The
interface being used by the CryptFS is via the virtual node also known as the
stackable V-node. Linux-based Oss leverages the V-nodes to represent open
files, devices, directory or other objectives.
The virtual nodes do not expose the file systems they implement. They use
the concept known as V-stacking to allow the function modularization of the
file system whereby one virtual node interface node calls another. Below is a diagram showing how this takes
place (McDonald & Kuhn, 1999).
Conclusion
The contribution of this article has offered the discussion
of the available file encryption systems including the comparative analysis of
those systems. The cryptographic file
systems are becoming commonplace due to the heightening threat of the cyber
braches that has been making organizations to lose many funds through the
same. Data and information are crucial
for the operation of the organizations and losing the same can make the
organizations to lose their image apart from undergoing huge financial losses
in trying to recover from the leakage. The cryptographic file systems are
useful in the protection data from being accessed by attackers by encrypting
it. They help to hide the data from
being observable by the attackers that leverage loopholes in the information
systems. The paper has discussed the
various encryption systems and techniques including the design of the same,
particularly the CryptFS. Through the
paper, the most suitable and dependable cryptographic file system can be understood
so that the organizations can implement the systems that will help them to have
the best file cryptography for their data.
References
Blaze, M.
(1993, December). A cryptographic file system for UNIX. In Proceedings of
the 1st ACM conference on Computer and communications security (pp. 9-16).
ACM.
McDonald,
A. D., & Kuhn, M. G. (1999, September). StegFS: A steganographic file
system for Linux. In Information Hiding (pp. 463-477). Springer Berlin
Heidelberg.
Wright, C.
P., Martino, M. C., & Zadok, E. (2003, June). NCryptfs: A Secure and
Convenient Cryptographic File System. In USENIX Annual Technical Conference,
General Track (pp. 197-210).
Wright, C.
P., Martino, M. C., & Zadok, E. (2003, June). NCryptfs: A Secure and
Convenient Cryptographic File System. In USENIX Annual Technical Conference,
General Track (pp. 197-210).
Pletka,
R., & Cachin, C. (2007, September). Cryptographic Security for a
High-Performance Distributed File System. In MSST (pp. 227-232).
Yun, A.,
Shi, C., & Kim, Y. (2009, November). On protecting integrity and
confidentiality of cryptographic file system for outsourced storage. In Proceedings
of the 2009 ACM workshop on Cloud computing security (pp. 67-76). ACM.
Sherry Roberts is the author of this paper. A senior editor at Melda Research in nursing writing services if you need a similar paper you can place your order for Customized Research Papers.
No comments:
Post a Comment