Securing Data at Rest

نویسندگان

  • Michael Wynne
  • Peter James
چکیده

This paper describes a highly original and new approach to securing data on workstations (desktops and laptops) that has been implemented by Secure Systems Ltd, into a product called the Silicon Data Vault (SDV). Over the past twenty years, a variety of Security Policy Models (SPMs), and products that implement the various SPMs have attempted to address the security needs of users processing sensitive or classified information on workstations. Invariably, to achieve the required level of security, these security products have been functionally restrictive and/or have introduced usability constraints. The distinctive data security features of the SDV provide a functionally rich product with no usability constraints. This paper commences by considering the user and security business requirements for a workstation that is used to process sensitive or classified information. The distinctive security functionality of the SDV is presented, supported by operational models and use scenarios. The paper concludes by enumerating the benefits the SDV can deliver. REQUIREMENTS FOR A SECURE WORKSTATION Through market research, feedback from clients and knowledge of the ICT security marketplace, Secure Systems has identified the following set of requirements that are considered mandatory by many users of workstations holding sensitive information: 1. Provide the highest level of security possible without impacting usability. 2. Only authorised users are allowed access to the workstation; i.e., users must identify and authenticate prior to the workstation being available. 3. Access to data is based on security clearance and/or need to know. 4. Data is protected such that removal or theft of the workstation hard disk does not allow data to be accessed. 5. Protection is provided against brute force attacks. 6. A record/log of workstation/data access/activity is generated. 7. The workstation can be restored to its original state following de-installation of the data security functionality. 8. Support is provided for forensic investigation. 9. There is no or minimal performance impact. 10. Allow an authorised user to dynamically change access rights to data. 11. The data security mechanisms are embedded in a Commercial Off the Shelf (COTS) product, i.e. no special integration work is required. 12. Data security mechanisms integrate seamlessly within a workstation Common Operating Environment. 13. An Administrator is able to configure the data security mechanisms both locally on the workstation and remotely over a network. 14. The workstation data security mechanisms have been independently evaluated and certified against internationally recognised standards. Secure Systems believes a secure solution that addresses the above requirements must have all the attributes modelled in Figure 1. Figure 1: Components of a secure solution The SDV has been designed to include all of the attributes detailed in Figure 1, incorporating pre-boot user authentication, hard disk partitioning, differentiated user access rights, and strong data encryption and key management. THE SILICON DATA VAULT The SDV consists of several components; hard disk partitioning, user access control based upon defined user profiles including, access right limitations, user authentication on power-up, a physically encrypted data vault and second stage encryption key module. Due to its activation early in the boot process, it is operating system independent. The device can be used on shared desktop environments or laptops where different user profiles can be established. Hardware Based Solution The SDV is a hardware security device that encrypts the entire hard disk. The SDV acts as a ‘gateway’ between the workstation central processing unit (CPU) and the hard disk. All data either retrieved or sent to the hard disk must pass through the ‘gateway’ with the ‘gateway’ encrypting/decrypting the data. Figure 2 provides a basic representation of this process. Figure 2: Gateway process SDV Hard Disk Encrypted/Protected Decrypted/Plain Text Workstation (CPU, RAM, BUS) Hardware based cryptosystems are recognised as the most secure and efficient implementation of cryptographic protection. The benefits include the capacity for larger processing ability and tamper resistant implementations. Although the design could potentially be reverse engineered, generally, it does not expose the encryption algorithm. Hardware systems are susceptible to tempest attacks, but as this requires specialised skill sets and tools, it would be considered a minute risk in comparison to software reverse engineering of the encryption algorithm (Rae & Wildman 2003). A solution comprising solely software poses a greater risk of successful hacking than a hardware solution. Many software-implemented cryptosystems have been circumvented by operating systems or other software running parallel to the cryptosystem (Cerberus 1999).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Simple Technique for Securing Data at Rest Stored in a Computing Cloud

“Cloud Computing” offers many potential benefits, including cost savings, the ability to deploy applications and services quickly, and the ease of scaling those application and services once they are deployed. A key barrier for enterprise adoption is the confidentiality of data stored on Cloud Computing Infrastructure. Our simple technique implemented with Open Source software solves this probl...

متن کامل

Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining

Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...

متن کامل

Self-assessment of Mental Health Among Students of Iran University of Medical Sciences

Background and Objective: The students studying at the universities of medical sciences deal with numerous stressors during their educational experiences in the healthcare settings, which lead to poor mental health status and low performance. Regarding the role of students in the provision, maintenance and promotion of community health, this study was aimed to determine the self-assessment of m...

متن کامل

A Cryptographic System Based upon the Principles of Gene Expression

Processes of gene expression such as regulation of transcription by the general transcription complex can be used to create hard cryptographic protocols which should not be breakable by common cipherattack methodologies. The eukaryotic processes of gene expression permit expansion of DNA cryptography into complex networks of transcriptional and translational coding interactions. I describe a me...

متن کامل

High Performance Storage Encryption on Intel(R) Architecture Processors White Paper

There is a critical need for securing data-at-rest in enterprise storage devices at very high data rates. The IEEE has drafted the P1619 standard to support encryption of data-at-rest for block-based devices. This paper describes the performance characteristics of an optimized implementation of storage encryption, benefiting from the AES-NI set of instructions on Intel ® processors based on the...

متن کامل

Securing Data in Cloud Using Homomorphic Encryption

Security and privacy in cloud computing is one of the most challenging ongoing research areas because data owner stores their sensitive data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. Since cloud computing is rest on internet, various security issues like privacy, data integrity, confidentiality, authentica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004