Protecting Portable Data with Host Validation
نویسندگان
چکیده
The use of portable storage devices such as key-chain USB devices is now ubiquitous. Many use these devices with impunity–repeatedly using the same storage device in open computer laboratories, Internet cafes, and on office and home computers. Such devices are now the target of malware that exploit the data present or use them as a means to propagate malicious software, e.g., Conficker and Agent.bz. This paper presents the Kells mobile storage system. Kells limits untrusted or unknown systems from accessing sensitive data by continuously validating the accessing host’s integrity state. We explore the design and operation of Kells, and implement a proof-of-concept USB 2.0 storage device on experimental hardware. Our analysis of Kells is twofold. We first prove the security of device operation (within a freshness security parameter ∆t) using the LS logic of secure systems. Second, we empirically evaluate the performance of the Kells device. These experiments indicate that the overheads associated with host validation are nominal, showing a worst case throughput overhead of 1.22% for read operations and 2.78% for writes.
منابع مشابه
A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts
Mobile agents have been considered a promising technology to develop e-commerce applications, however the security concerns about the technology have stopped its widespread use. The identified security areas comprise protecting hosts against malicious agents, protecting the agent’s transmission and protecting agents against malicious hosts. The first two security issues and the protection of th...
متن کاملClient Security in the Enterprise Network: Dell's Perspective
Client computer security is a broad subject that includes securing access to network resources, securing data transfers over private and public networks, and protecting client computers and local data from theft. Security is increasingly important as portable computers, vulnerable to theft, proliferate and the Internet revolutionizes communications and commerce. Applications such as e-commerce,...
متن کاملThe validation of one halitosis measuring device (Etiquette checker)
BACKGROUND AND AIM: Various measurement devices are available for detection of halitosis. For epidemiologic studies, it is necessary to use a portable and small device. This study aimed to investigation of correlation between measuring the device (Etiquette checker) with Halimeter. METHODS: One hundred volunteers (students and patients) participated in this study. The amount of volatile sulfur ...
متن کاملThe role of cellular antioxidant pathways in protecting neurons during photodynamic therapy
The effect of photodynamic therapy (PDT) on neurons is an important consideration when treating cancers within or adjacent to the nervous system. The photosensitiser, meta-tetrahydroxyphenyl chlorin (mTHPC) is effective in destroying tumour cells but can spare neurons in culture. The aim of this study was to investigate the role of cellular antioxidant pathways in protecting neurons from damage...
متن کاملA Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010